Book description
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-fo
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Foreword
- Preface
- Acknowledgments
- Office Memorandum
- Chapter 1 - Introduction (1/3)
- Chapter 1 - Introduction (2/3)
- Chapter 1 - Introduction (3/3)
- Chapter 2 - Why Measure Information Security? (1/4)
- Chapter 2 - Why Measure Information Security? (2/4)
- Chapter 2 - Why Measure Information Security? (3/4)
- Chapter 2 - Why Measure Information Security? (4/4)
- Chapter 3 - The Art and Science of Security Metrics (1/5)
- Chapter 3 - The Art and Science of Security Metrics (2/5)
- Chapter 3 - The Art and Science of Security Metrics (3/5)
- Chapter 3 - The Art and Science of Security Metrics (4/5)
- Chapter 3 - The Art and Science of Security Metrics (5/5)
- Chapter 4 - Audiences for Security Metrics (1/2)
- Chapter 4 - Audiences for Security Metrics (2/2)
- Chapter 5 - Finding Candidate Metrics (1/4)
- Chapter 5 - Finding Candidate Metrics (2/4)
- Chapter 5 - Finding Candidate Metrics (3/4)
- Chapter 5 - Finding Candidate Metrics (4/4)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (1/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (2/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (3/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (4/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (5/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (6/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (7/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (8/8)
- Chapter 7 - 150+ Example Security Metrics (1/26)
- Chapter 7 - 150+ Example Security Metrics (2/26)
- Chapter 7 - 150+ Example Security Metrics (3/26)
- Chapter 7 - 150+ Example Security Metrics (4/26)
- Chapter 7 - 150+ Example Security Metrics (5/26)
- Chapter 7 - 150+ Example Security Metrics (6/26)
- Chapter 7 - 150+ Example Security Metrics (7/26)
- Chapter 7 - 150+ Example Security Metrics (8/26)
- Chapter 7 - 150+ Example Security Metrics (9/26)
- Chapter 7 - 150+ Example Security Metrics (10/26)
- Chapter 7 - 150+ Example Security Metrics (11/26)
- Chapter 7 - 150+ Example Security Metrics (12/26)
- Chapter 7 - 150+ Example Security Metrics (13/26)
- Chapter 7 - 150+ Example Security Metrics (14/26)
- Chapter 7 - 150+ Example Security Metrics (15/26)
- Chapter 7 - 150+ Example Security Metrics (16/26)
- Chapter 7 - 150+ Example Security Metrics (17/26)
- Chapter 7 - 150+ Example Security Metrics (18/26)
- Chapter 7 - 150+ Example Security Metrics (19/26)
- Chapter 7 - 150+ Example Security Metrics (20/26)
- Chapter 7 - 150+ Example Security Metrics (21/26)
- Chapter 7 - 150+ Example Security Metrics (22/26)
- Chapter 7 - 150+ Example Security Metrics (23/26)
- Chapter 7 - 150+ Example Security Metrics (24/26)
- Chapter 7 - 150+ Example Security Metrics (25/26)
- Chapter 7 - 150+ Example Security Metrics (26/26)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (1/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (2/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (3/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (4/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (5/5)
- Chapter 9 - Advanced Information Security Metrics (1/3)
- Chapter 9 - Advanced Information Security Metrics (2/3)
- Chapter 9 - Advanced Information Security Metrics (3/3)
- Chapter 10 - Downsides of Metrics (1/2)
- Chapter 10 - Downsides of Metrics (2/2)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (1/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (2/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (3/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (4/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (5/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (6/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (7/7)
- Chapter 12 - Case Study (1/9)
- Chapter 12 - Case Study (2/9)
- Chapter 12 - Case Study (3/9)
- Chapter 12 - Case Study (4/9)
- Chapter 12 - Case Study (5/9)
- Chapter 12 - Case Study (6/9)
- Chapter 12 - Case Study (7/9)
- Chapter 12 - Case Study (8/9)
- Chapter 12 - Case Study (9/9)
- Chapter 13 - Conclusions (1/3)
- Chapter 13 - Conclusions (2/3)
- Chapter 13 - Conclusions (3/3)
- Appendix A: PRAGMATIC Criteria
- Appendix B: Business Model of Information Security (BMIS)
- Appendix C: Capability Maturity Model (CMM)
- Appendix D: Example Opinion Survey Form
- Appendix E: SABSA Security Attributes Table (1/4)
- Appendix E: SABSA Security Attributes Table (2/4)
- Appendix E: SABSA Security Attributes Table (3/4)
- Appendix E: SABSA Security Attributes Table (4/4)
- Appendix F: Prototype Metrics Catalog (1/4)
- Appendix F: Prototype Metrics Catalog (2/4)
- Appendix F: Prototype Metrics Catalog (3/4)
- Appendix F: Prototype Metrics Catalog (4/4)
- Appendix G: Effect of Weighting the PRAGMATIC Criteria
- Appendix H: ISO27k Maturity Scale Metrics (1/9)
- Appendix H: ISO27k Maturity Scale Metrics (2/9)
- Appendix H: ISO27k Maturity Scale Metrics (3/9)
- Appendix H: ISO27k Maturity Scale Metrics (4/9)
- Appendix H: ISO27k Maturity Scale Metrics (5/9)
- Appendix H: ISO27k Maturity Scale Metrics (6/9)
- Appendix H: ISO27k Maturity Scale Metrics (7/9)
- Appendix H: ISO27k Maturity Scale Metrics (8/9)
- Appendix H: ISO27k Maturity Scale Metrics (9/9)
- Appendix I: Sample Management Survey
- Appendix J: Observer Bias
- Appendix K: Observer Calibration
- Appendix L: Bibliography
- Back Cover
Product information
- Title: PRAGMATIC Security Metrics
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439881538
You might also like
book
Tidy First?
Messy code is a nuisance. "Tidying" code, to make it more readable, requires breaking it up …
audiobook
The Design of Everyday Things
First, businesses discovered quality as a key competitive edge; next came science. Now, Donald A. Norman, …
audiobook
Joy of Agility
Agility enables you, your team, and your organization to streamline slow and awkward actions, overcome obstacles …
audiobook
How to Do Nothing
A galvanizing critique of the forces vying for our attention-and our personal information-that redefines what we …