The security risk assessment handbook a complete guide for performing security risk assessments
Saved in:
| Main Author: | Landoll, Douglas J. |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press
2010.
|
| Edition: | 2nd ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Risk assessment and management handbook for environmental, health, and safety professionals
Published: (1996)
Published: (1996)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Multilevel modeling of secure systems in QoP-ML
by: Ksįeżopolski, Bogdan
Published: (2015)
by: Ksįeżopolski, Bogdan
Published: (2015)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Risk assessment in geotechnical engineering
by: Fenton, Gordon A.
Published: (2008)
by: Fenton, Gordon A.
Published: (2008)
Risk assessment and decision making in business and industry a pracical guide
by: Koller lhGlenn R
by: Koller lhGlenn R
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Probabilistic risk assessment and management for engineers and scientists
by: Kumamoto, Hiromitsu
Published: (1996)
by: Kumamoto, Hiromitsu
Published: (1996)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Risk modeling,assessment and management
by: Haimes
Published: (1998)
by: Haimes
Published: (1998)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Environmental risk mangement
by: Pritchard
Published: (2000)
by: Pritchard
Published: (2000)
Technical risk management
by: Michaels
Published: (1996)
by: Michaels
Published: (1996)
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
Multimedia forensics and security
Published: (2009)
Published: (2009)
ISO 31000:2018 ENTERPRISE RISK MANAGEMENT /
by: Hutchins, Greg
Published: (2018)
by: Hutchins, Greg
Published: (2018)
Data science for cyber-security
Published: (2019)
Published: (2019)
Strategies for risk communication evolution, evidence, experience
Published: (2008)
Published: (2008)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Computer security handbook
Published: (2014)
Published: (2014)
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
Information protection playbook
Published: (2013)
Published: (2013)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Risk and the law
Published: (2009)
Published: (2009)
B2b and beyond new business models built on trust
by: DcMaio, Harry B.
Published: (2001)
by: DcMaio, Harry B.
Published: (2001)
Data mining the web concepts, techniques and applications in Microsoft Office Excel with XLMiner
by: Shmueli
Published: (2007)
by: Shmueli
Published: (2007)
Risk theory a heavy tail approach
by: Konstantinides, Dimitrios G.
Published: (2018)
by: Konstantinides, Dimitrios G.
Published: (2018)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Similar Items
-
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016) -
Advances in enterprise information technology security
Published: (2007) -
Risk assessment and management handbook for environmental, health, and safety professionals
Published: (1996) -
E-commerce security
by: Ghosh
Published: (1998) -
Multilevel modeling of secure systems in QoP-ML
by: Ksįeżopolski, Bogdan
Published: (2015)


