Skip to Main Content
Risk Analysis and the Security Survey, 3rd Edition
book

Risk Analysis and the Security Survey, 3rd Edition

by Gene Tucker, James F. Broder
February 2006
Intermediate to advanced content levelIntermediate to advanced
392 pages
12h 13m
English
Butterworth-Heinemann
Content preview from Risk Analysis and the Security Survey, 3rd Edition
or procedure, and it is a ready means of analyzing complex operations that cannot
easily be reduced to meaningful narrative description. Figure 8.1 shows some
standard flowchart symbols and a legend describing each symbol used. Sometimes
a simple sketch may suffice; at other times, it may be necessary to use plastic overlays
to describe detailed and complex operations. Figure 8.2 is an example of a formal
flowchart describing a complex operation. Flowcharts, however, need not be formal
or greatly detailed to accomplish the task. Table 8.1 is an ex ample of a simple, informal
flowchart.
Symbol Explanation
Starting point in the flow of documents
Document ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition

EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition

IT Governance Privacy Team
Enterprise Risk Management

Enterprise Risk Management

John Fraser, Betty Simkins
Mastering Operational Risk, 2nd Edition

Mastering Operational Risk, 2nd Edition

Tony Blunden, John Thirlwell

Publisher Resources

ISBN: 9780750679220