- 中图分类号: TP3
- 语种: ENG
- 出版信息: Syngress_TM 2011 361页
- EISBN: 9781597496162
- PISBN-P: 9781597496155
- 原文访问地址:
KG评星
知识图谱评星,是一种基于用户使用的评价体系,综合图书的评论数量、引文数量、Amazon评分以及图谱网络中节点的PageRank值(即考虑相邻节点数量和重要性)等多种因素计算而得出的评价数值。星级越高,推荐值越高。CAT核心级
核心学术资源(CAR)项目作为教图公司推出的一项知识型服务,旨在打造一套科学、有效的图书评价体系,并协助用户制定相应的馆藏建设方案。CAR项目调查和分析12所世界一流大学的藏书数据,以收藏学校的数量确定书目的核心级,核心级越高,代表书目的馆藏价值越高。选取核心级在三级以上,即三校以上共藏的图书作为核心书目(CAT)。Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs.Named a 2011 Best Governance and ISMS Book by InfoSec Reviews Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investmentExplores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate riskPresents a roadmap for designing and implementing a security risk management program