Metrics And Methods For Security Risk Management at Meripustak

Metrics And Methods For Security Risk Management

Books from same Author: Carl Young

Books from same Publisher: ELSEVIER

Related Category: Author List / Publisher List


  • Price: ₹ 3736.00/- [ 27.00% off ]

    Seller Price: ₹ 2727.00

Sold By: Store4Doctors      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 27.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 27.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Carl Young
    PublisherELSEVIER
    ISBN9781856179782
    Pages296
    BindingSoftbound
    LanguageEnglish
    Publish YearSeptember 2010

    Description

    ELSEVIER Metrics And Methods For Security Risk Management by Carl Young

    Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics and Methods for Security Risk Management is of interest, especially since the 9/11 terror attacks, because it addresses the ways to manage risk security in the corporate world. The book aims to provide information about the fundamentals of security risks and the corresponding components, an analytical approach to risk assessments and mitigation, and quantitative methods to assess the risk components. In addition, it also discusses the physical models, principles, and quantitative methods needed to assess the risk components. The by-products of the methodology used include security standards, audits, risk metrics, and program frameworks. Security professionals, as well as scientists and engineers who are working on technical issues related to security problems will find this book relevant and useful.