Douglas Landoll
The Security Risk Assessment Handbook (eBook, PDF)
A Complete Guide for Performing Security Risk Assessments
62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
62,95 €
Als Download kaufen
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
31 °P sammeln
Douglas Landoll
The Security Risk Assessment Handbook (eBook, PDF)
A Complete Guide for Performing Security Risk Assessments
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The third edition has expended coverage essential topics such as threat analysis, data gathering, risk analysis, and risk assessment methods and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, security risk assessment methods).
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 29.34MB
Andere Kunden interessierten sich auch für
- Douglas LandollThe Security Risk Assessment Handbook (eBook, ePUB)62,95 €
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience (eBook, PDF)49,95 €
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience (eBook, ePUB)49,95 €
- Robert SladeCybersecurity Lessons from CoVID-19 (eBook, PDF)20,95 €
- William L. JenningsFraud Investigation and Forensic Accounting in the Real World (eBook, PDF)46,95 €
- Jeffrey W. BrownThe Security Leader's Communication Playbook (eBook, PDF)47,95 €
- David X MartinCyRM (eBook, PDF)36,95 €
-
-
-
The third edition has expended coverage essential topics such as threat analysis, data gathering, risk analysis, and risk assessment methods and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, security risk assessment methods).
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 512
- Erscheinungstermin: 27. September 2021
- Englisch
- ISBN-13: 9781000413205
- Artikelnr.: 62366816
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 512
- Erscheinungstermin: 27. September 2021
- Englisch
- ISBN-13: 9781000413205
- Artikelnr.: 62366816
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Douglas Landoll has over two decades of information security experience. He has led security risk assessments and established security programs for top corporations and government agencies. He is an expert in security risk assessment, security risk management, security criteria, and building corporate security programs. His background includes evaluating security at the National Security Agency (NSA), North Atlantic Treaty Organization (NATO), Central Intelligence Agency (CIA), and other government agencies; co-founding the Arca Common Criteria Testing Laboratory, co-authoring the systems security engineering capability maturity model (SSE-CMM); teaching at NSA's National Cryptologic School; and running the southwest security services division for Exodus Communications.
Doug is currently the CEO of Lantego, specializing in risk assessment, policy and training. He is a certified information systems security professional (CISSP) and certified information systems auditor (CISA). He holds a BS degree from James Madison University and an MBA from the University of Texas at Austin. He has published numerous information security articles, speaks regularly at conferences, and serves as an advisor for several high-tech companies.
Doug is currently the CEO of Lantego, specializing in risk assessment, policy and training. He is a certified information systems security professional (CISSP) and certified information systems auditor (CISA). He holds a BS degree from James Madison University and an MBA from the University of Texas at Austin. He has published numerous information security articles, speaks regularly at conferences, and serves as an advisor for several high-tech companies.
Foreword 1. Introduction 2. Information Security Risk Assessment Basics 3.
Project Definition 4. Security Risk Assessment Preparation 5. Data
Gathering 6. Administrative Data Gathering 7. Technical Data Gathering 8.
Physical Data Gathering 9. Security Risk Analysis 10. Security Risk
Mitigation 11. Security Risk Assessment Reporting 12. Security Risk
Assessment Project Management 13. Cloud Security Risk Assessment 14. Vendor
Security Risk Assessment 15. Very small and very large assessments 16.
Security Risk Assessment Approaches Appendix. Relevant Standards and
Regulations
Project Definition 4. Security Risk Assessment Preparation 5. Data
Gathering 6. Administrative Data Gathering 7. Technical Data Gathering 8.
Physical Data Gathering 9. Security Risk Analysis 10. Security Risk
Mitigation 11. Security Risk Assessment Reporting 12. Security Risk
Assessment Project Management 13. Cloud Security Risk Assessment 14. Vendor
Security Risk Assessment 15. Very small and very large assessments 16.
Security Risk Assessment Approaches Appendix. Relevant Standards and
Regulations
Foreword 1. Introduction 2. Information Security Risk Assessment Basics 3. Project Definition 4. Security Risk Assessment Preparation 5. Data Gathering 6. Administrative Data Gathering 7. Technical Data Gathering 8. Physical Data Gathering 9. Security Risk Analysis 10. Security Risk Mitigation 11. Security Risk Assessment Reporting 12. Security Risk Assessment Project Management 13. Cloud Security Risk Assessment 14. Vendor Security Risk Assessment 15. Very small and very large assessments 16. Security Risk Assessment Approaches Appendix. Relevant Standards and Regulations
Foreword 1. Introduction 2. Information Security Risk Assessment Basics 3.
Project Definition 4. Security Risk Assessment Preparation 5. Data
Gathering 6. Administrative Data Gathering 7. Technical Data Gathering 8.
Physical Data Gathering 9. Security Risk Analysis 10. Security Risk
Mitigation 11. Security Risk Assessment Reporting 12. Security Risk
Assessment Project Management 13. Cloud Security Risk Assessment 14. Vendor
Security Risk Assessment 15. Very small and very large assessments 16.
Security Risk Assessment Approaches Appendix. Relevant Standards and
Regulations
Project Definition 4. Security Risk Assessment Preparation 5. Data
Gathering 6. Administrative Data Gathering 7. Technical Data Gathering 8.
Physical Data Gathering 9. Security Risk Analysis 10. Security Risk
Mitigation 11. Security Risk Assessment Reporting 12. Security Risk
Assessment Project Management 13. Cloud Security Risk Assessment 14. Vendor
Security Risk Assessment 15. Very small and very large assessments 16.
Security Risk Assessment Approaches Appendix. Relevant Standards and
Regulations
Foreword 1. Introduction 2. Information Security Risk Assessment Basics 3. Project Definition 4. Security Risk Assessment Preparation 5. Data Gathering 6. Administrative Data Gathering 7. Technical Data Gathering 8. Physical Data Gathering 9. Security Risk Analysis 10. Security Risk Mitigation 11. Security Risk Assessment Reporting 12. Security Risk Assessment Project Management 13. Cloud Security Risk Assessment 14. Vendor Security Risk Assessment 15. Very small and very large assessments 16. Security Risk Assessment Approaches Appendix. Relevant Standards and Regulations