Book description
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-wor
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- Biography
- Chapter 1: Introduction (1/5)
- Chapter 1: Introduction (2/5)
- Chapter 1: Introduction (3/5)
- Chapter 1: Introduction (4/5)
- Chapter 1: Introduction (5/5)
- Chapter 2: Information Security Risk Assessment Basics (1/4)
- Chapter 2: Information Security Risk Assessment Basics (2/4)
- Chapter 2: Information Security Risk Assessment Basics (3/4)
- Chapter 2: Information Security Risk Assessment Basics (4/4)
- Chapter 3: Project Definition (1/7)
- Chapter 3: Project Definition (2/7)
- Chapter 3: Project Definition (3/7)
- Chapter 3: Project Definition (4/7)
- Chapter 3: Project Definition (5/7)
- Chapter 3: Project Definition (6/7)
- Chapter 3: Project Definition (7/7)
- Chapter 4: Security Risk Assessment Preparation (1/8)
- Chapter 4: Security Risk Assessment Preparation (2/8)
- Chapter 4: Security Risk Assessment Preparation (3/8)
- Chapter 4: Security Risk Assessment Preparation (4/8)
- Chapter 4: Security Risk Assessment Preparation (5/8)
- Chapter 4: Security Risk Assessment Preparation (6/8)
- Chapter 4: Security Risk Assessment Preparation (7/8)
- Chapter 4: Security Risk Assessment Preparation (8/8)
- Chapter 5: Data Gathering (1/7)
- Chapter 5: Data Gathering (2/7)
- Chapter 5: Data Gathering (3/7)
- Chapter 5: Data Gathering (4/7)
- Chapter 5: Data Gathering (5/7)
- Chapter 5: Data Gathering (6/7)
- Chapter 5: Data Gathering (7/7)
- Chapter 6: Administrative Data Gathering (1/14)
- Chapter 6: Administrative Data Gathering (2/14)
- Chapter 6: Administrative Data Gathering (3/14)
- Chapter 6: Administrative Data Gathering (4/14)
- Chapter 6: Administrative Data Gathering (5/14)
- Chapter 6: Administrative Data Gathering (6/14)
- Chapter 6: Administrative Data Gathering (7/14)
- Chapter 6: Administrative Data Gathering (8/14)
- Chapter 6: Administrative Data Gathering (9/14)
- Chapter 6: Administrative Data Gathering (10/14)
- Chapter 6: Administrative Data Gathering (11/14)
- Chapter 6: Administrative Data Gathering (12/14)
- Chapter 6: Administrative Data Gathering (13/14)
- Chapter 6: Administrative Data Gathering (14/14)
- Chapter 7: Technical Data Gathering (1/15)
- Chapter 7: Technical Data Gathering (2/15)
- Chapter 7: Technical Data Gathering (3/15)
- Chapter 7: Technical Data Gathering (4/15)
- Chapter 7: Technical Data Gathering (5/15)
- Chapter 7: Technical Data Gathering (6/15)
- Chapter 7: Technical Data Gathering (7/15)
- Chapter 7: Technical Data Gathering (8/15)
- Chapter 7: Technical Data Gathering (9/15)
- Chapter 7: Technical Data Gathering (10/15)
- Chapter 7: Technical Data Gathering (11/15)
- Chapter 7: Technical Data Gathering (12/15)
- Chapter 7: Technical Data Gathering (13/15)
- Chapter 7: Technical Data Gathering (14/15)
- Chapter 7: Technical Data Gathering (15/15)
- Chapter 8: Physical Data Gathering (1/16)
- Chapter 8: Physical Data Gathering (2/16)
- Chapter 8: Physical Data Gathering (3/16)
- Chapter 8: Physical Data Gathering (4/16)
- Chapter 8: Physical Data Gathering (5/16)
- Chapter 8: Physical Data Gathering (6/16)
- Chapter 8: Physical Data Gathering (7/16)
- Chapter 8: Physical Data Gathering (8/16)
- Chapter 8: Physical Data Gathering (9/16)
- Chapter 8: Physical Data Gathering (10/16)
- Chapter 8: Physical Data Gathering (11/16)
- Chapter 8: Physical Data Gathering (12/16)
- Chapter 8: Physical Data Gathering (13/16)
- Chapter 8: Physical Data Gathering (14/16)
- Chapter 8: Physical Data Gathering (15/16)
- Chapter 8: Physical Data Gathering (16/16)
- Chapter 9: Security Risk Analysis (1/4)
- Chapter 9: Security Risk Analysis (2/4)
- Chapter 9: Security Risk Analysis (3/4)
- Chapter 9: Security Risk Analysis (4/4)
- Chapter 10: Security Risk Mitigation (1/3)
- Chapter 10: Security Risk Mitigation (2/3)
- Chapter 10: Security Risk Mitigation (3/3)
- Chapter 11: Security Risk Assessment Reporting (1/3)
- Chapter 11: Security Risk Assessment Reporting (2/3)
- Chapter 11: Security Risk Assessment Reporting (3/3)
- Chapter 12: Security Risk Assessment Project Management (1/6)
- Chapter 12: Security Risk Assessment Project Management (2/6)
- Chapter 12: Security Risk Assessment Project Management (3/6)
- Chapter 12: Security Risk Assessment Project Management (4/6)
- Chapter 12: Security Risk Assessment Project Management (5/6)
- Chapter 12: Security Risk Assessment Project Management (6/6)
- Chapter 13: Security Risk Assessment Approaches (1/4)
- Chapter 13: Security Risk Assessment Approaches (2/4)
- Chapter 13: Security Risk Assessment Approaches (3/4)
- Chapter 13: Security Risk Assessment Approaches (4/4)
- Back Cover
Product information
- Title: The Security Risk Assessment Handbook, 2nd Edition
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781439821497
You might also like
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Data Center Handbook, 2nd Edition
DATA CENTER HANDBOOK Written by 59 experts and reviewed by a seasoned technical advisory board, the …
book
The Cyber Risk Handbook
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide …