Book description
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-wor
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- Biography
- Chapter 1: Introduction (1/5)
- Chapter 1: Introduction (2/5)
- Chapter 1: Introduction (3/5)
- Chapter 1: Introduction (4/5)
- Chapter 1: Introduction (5/5)
- Chapter 2: Information Security Risk Assessment Basics (1/4)
- Chapter 2: Information Security Risk Assessment Basics (2/4)
- Chapter 2: Information Security Risk Assessment Basics (3/4)
- Chapter 2: Information Security Risk Assessment Basics (4/4)
- Chapter 3: Project Definition (1/7)
- Chapter 3: Project Definition (2/7)
- Chapter 3: Project Definition (3/7)
- Chapter 3: Project Definition (4/7)
- Chapter 3: Project Definition (5/7)
- Chapter 3: Project Definition (6/7)
- Chapter 3: Project Definition (7/7)
- Chapter 4: Security Risk Assessment Preparation (1/8)
- Chapter 4: Security Risk Assessment Preparation (2/8)
- Chapter 4: Security Risk Assessment Preparation (3/8)
- Chapter 4: Security Risk Assessment Preparation (4/8)
- Chapter 4: Security Risk Assessment Preparation (5/8)
- Chapter 4: Security Risk Assessment Preparation (6/8)
- Chapter 4: Security Risk Assessment Preparation (7/8)
- Chapter 4: Security Risk Assessment Preparation (8/8)
- Chapter 5: Data Gathering (1/7)
- Chapter 5: Data Gathering (2/7)
- Chapter 5: Data Gathering (3/7)
- Chapter 5: Data Gathering (4/7)
- Chapter 5: Data Gathering (5/7)
- Chapter 5: Data Gathering (6/7)
- Chapter 5: Data Gathering (7/7)
- Chapter 6: Administrative Data Gathering (1/14)
- Chapter 6: Administrative Data Gathering (2/14)
- Chapter 6: Administrative Data Gathering (3/14)
- Chapter 6: Administrative Data Gathering (4/14)
- Chapter 6: Administrative Data Gathering (5/14)
- Chapter 6: Administrative Data Gathering (6/14)
- Chapter 6: Administrative Data Gathering (7/14)
- Chapter 6: Administrative Data Gathering (8/14)
- Chapter 6: Administrative Data Gathering (9/14)
- Chapter 6: Administrative Data Gathering (10/14)
- Chapter 6: Administrative Data Gathering (11/14)
- Chapter 6: Administrative Data Gathering (12/14)
- Chapter 6: Administrative Data Gathering (13/14)
- Chapter 6: Administrative Data Gathering (14/14)
- Chapter 7: Technical Data Gathering (1/15)
- Chapter 7: Technical Data Gathering (2/15)
- Chapter 7: Technical Data Gathering (3/15)
- Chapter 7: Technical Data Gathering (4/15)
- Chapter 7: Technical Data Gathering (5/15)
- Chapter 7: Technical Data Gathering (6/15)
- Chapter 7: Technical Data Gathering (7/15)
- Chapter 7: Technical Data Gathering (8/15)
- Chapter 7: Technical Data Gathering (9/15)
- Chapter 7: Technical Data Gathering (10/15)
- Chapter 7: Technical Data Gathering (11/15)
- Chapter 7: Technical Data Gathering (12/15)
- Chapter 7: Technical Data Gathering (13/15)
- Chapter 7: Technical Data Gathering (14/15)
- Chapter 7: Technical Data Gathering (15/15)
- Chapter 8: Physical Data Gathering (1/16)
- Chapter 8: Physical Data Gathering (2/16)
- Chapter 8: Physical Data Gathering (3/16)
- Chapter 8: Physical Data Gathering (4/16)
- Chapter 8: Physical Data Gathering (5/16)
- Chapter 8: Physical Data Gathering (6/16)
- Chapter 8: Physical Data Gathering (7/16)
- Chapter 8: Physical Data Gathering (8/16)
- Chapter 8: Physical Data Gathering (9/16)
- Chapter 8: Physical Data Gathering (10/16)
- Chapter 8: Physical Data Gathering (11/16)
- Chapter 8: Physical Data Gathering (12/16)
- Chapter 8: Physical Data Gathering (13/16)
- Chapter 8: Physical Data Gathering (14/16)
- Chapter 8: Physical Data Gathering (15/16)
- Chapter 8: Physical Data Gathering (16/16)
- Chapter 9: Security Risk Analysis (1/4)
- Chapter 9: Security Risk Analysis (2/4)
- Chapter 9: Security Risk Analysis (3/4)
- Chapter 9: Security Risk Analysis (4/4)
- Chapter 10: Security Risk Mitigation (1/3)
- Chapter 10: Security Risk Mitigation (2/3)
- Chapter 10: Security Risk Mitigation (3/3)
- Chapter 11: Security Risk Assessment Reporting (1/3)
- Chapter 11: Security Risk Assessment Reporting (2/3)
- Chapter 11: Security Risk Assessment Reporting (3/3)
- Chapter 12: Security Risk Assessment Project Management (1/6)
- Chapter 12: Security Risk Assessment Project Management (2/6)
- Chapter 12: Security Risk Assessment Project Management (3/6)
- Chapter 12: Security Risk Assessment Project Management (4/6)
- Chapter 12: Security Risk Assessment Project Management (5/6)
- Chapter 12: Security Risk Assessment Project Management (6/6)
- Chapter 13: Security Risk Assessment Approaches (1/4)
- Chapter 13: Security Risk Assessment Approaches (2/4)
- Chapter 13: Security Risk Assessment Approaches (3/4)
- Chapter 13: Security Risk Assessment Approaches (4/4)
- Back Cover
Product information
- Title: The Security Risk Assessment Handbook, 2nd Edition
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781439821497
You might also like
book
The Security Risk Assessment Handbook, 3rd Edition
The third edition has expended coverage essential topics such as threat analysis, data gathering, risk analysis, …
book
Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and …
book
Security Risk Assessment
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a …
book
Information Security Risk Assessment Toolkit
In order to protect company’s information assets such as sensitive customer records, health care records, etc., …