Sold Out
Book Categories |
Sect. I | Security concepts | |
1 | Using models | 3 |
2 | Defining information security | 23 |
3 | Information as an asset | 41 |
4 | Understanding threat and its relation to vulnerabilities | 57 |
5 | Assessing risk variables : the risk assessment process | 71 |
Sect. II | The McCumber Cube methodology | |
6 | The McCumber Cube | 99 |
7 | Determining information states and mapping information flow | 111 |
8 | Decomposing the cube for security enforcement | 131 |
9 | Information state analysis for components and subsystems | 153 |
10 | Managing the security life cycle | 165 |
11 | Safeguard analysis | 177 |
12 | Practical applications of McCumber Cube analysis | 197 |
Sect. III | Appendices | |
App. A | Vulnerabilities | 223 |
App. B | Risk assessment metrics | 235 |
App. C | Diagrams and tables | 245 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionAssessing and Managing Security Risk in IT Systems
X
This Item is in Your InventoryAssessing and Managing Security Risk in IT Systems
X
You must be logged in to review the productsX
X
X
Add Assessing and Managing Security Risk in IT Systems, , Assessing and Managing Security Risk in IT Systems to the inventory that you are selling on WonderClubX
X
Add Assessing and Managing Security Risk in IT Systems, , Assessing and Managing Security Risk in IT Systems to your collection on WonderClub |