WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/133185

Information security risk analysis

A veteran of computer technology and especially computer security, Peltier presents a variety of concepts and ideas about risk analysis, and demonstrates how they can be used. He covers risk management, the risk assessment process, quantitative versus qualitative approaches, other forms of qualitative risk assessment, the facilitated risk analysis.

Open All Close All

http://schema.org/about

http://schema.org/description

  • "A veteran of computer technology and especially computer security, Peltier presents a variety of concepts and ideas about risk analysis, and demonstrates how they can be used. He covers risk management, the risk assessment process, quantitative versus qualitative approaches, other forms of qualitative risk assessment, the facilitated risk analysis."
  • "A veteran of computer technology and especially computer security, Peltier presents a variety of concepts and ideas about risk analysis, and demonstrates how they can be used. He covers risk management, the risk assessment process, quantitative versus qualitative approaches, other forms of qualitative risk assessment, the facilitated risk analysis."@en
  • "Offers readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment. This title demonstrates how to identify threats and then determine if those threats pose a real risk. It is suitable for industry and academia professionals."@en
  • "Information Security Risk Analysis will allow any organization to implement risk management techniques that will prove to be cost effective. Using the PARA (Practical Application of Risk Analysis) process the book examines the qualitative risk analysis process and then provides tested variations on the methodology. The PARA process can be used by information security professionals, project managers, auditing, physical security, facilities management, or any organization that needs to determine what direction the organization must take on a specific issue."@en

http://schema.org/genre

  • "Ressources internet"
  • "Livres électroniques"
  • "Electronic books"
  • "Electronic books"@en

http://schema.org/name

  • "Information security risk analysis"@en
  • "Information security risk analysis"
  • "Information Security Risk Analysis"
  • "Information Security Risk Analysis"@en