ksiazki24h.pl
wprowadź własne kryteria wyszukiwania książek: (jak szukać?)
Twój koszyk:   0 zł   zamówienie wysyłkowe >>>
Strona główna > opis książki

METRICS AND METHODS FOR SECURITY RISK MAMAGEMENT


YOUNG C.

wydawnictwo: ELSEVIER , rok wydania 2010, wydanie I

cena netto: 199.00 Twoja cena  189,05 zł + 5% vat - dodaj do koszyka

Metrics and Methods for Security Risk Management
by Carl Young

Key Features

Offers an integrated approach to assessing security risk

Addresses homeland security as well as IT and physical security issues

Describes vital safeguards for ensuring true business continuity


Table of Contents

Dedication

Foreword and Acknowledgements

PART I

THE STRUCTURE AND FUNCTION OF SECURITY RISK

Chapter 1 Security Threats and Risk

1.0 Introduction to Security Risk or Tales of the Psychotic Squirrel and the Sociable Shark

1.1 The Fundamental Expression of Security Risk

1.2 Introduction to Security Risk Models and Security Risk Mitigation

1.3 Summary

Chapter 2 The Fundamentals of Security Risk Measurements

2.0 Introduction

2.1 Linearity and Non-linearity

2.2 Exponents, Logarithms and Sensitivity to Change

2.3 The Exponential Function ex

2.4 The Decibel (dB)

2.5 Security Risk and the Concept of Scale

2.6 Some Common Physical Models in Security Risk

2.7 Visualizing Security Risk

2.8 An Example: Guarding Costs

2.9 Summary

Chapter 3 Risk Measurements and Security Programs

3.0 Introduction

3.1 The Security Risk Assessment Process

3.1.1 Unique Threats

3.1.2 Motivating Security Risk Mitigation: The Five Commandments of Corporate Security

3.1.3 Security Risk Models

3.2 Mitigating Security Risk

3.2.1. The Security Risk Mitigation Process

3.2.2 Security Risk Standards

3.3 Security Risk Audits

3.4 Security Risk Program Frameworks

3.5 Summary

PART II

MEASURING AND MITIGATING SECURITY RISK

Chapter 4 Measuring the Likelihood Component of Security Risk

4.0 Introduction

4.1 Likelihood or Potential for Risk?

4.2 Estimating The Likelihood of Randomly Occurring Security Incidents

4.3 Estimating The Potential for Biased Security Incidents

4.4 Averages and Deviations

4.5 Actuarial Approaches to Security Risk

4.6 Randomness, Loss, and Expectation Value

4.7 Financial Risk

4.8 Summary

Chapter 5 Measuring the Vulnerability Component of Security Risk

5.0 Introduction

5.1 Vulnerability to Information Loss through Unauthorized Signal Detection

5.1.1 Energy, Waves and Information

5.1.2 Introduction to Acoustic Energy and Audible Information

5.1.3 Transmission of Audible Information and Vulnerability to Conversation-Level Overhears

5.1.4 Audible Information and the Effects of Intervening Structures

5.1.5 Introduction to Electromagnetic Energy and Vulnerability to Signal Detection

5.1.6 Electromagnetic Energy and the Effects of Intervening Structures

5.1.7 Vulnerability to Information Loss through Unauthorized Signal Detection: A Checklist

5.2 Vulnerability to Explosive Threats

5.2.1 Explosive Parameters

5.2.2 Confidence Limits and Explosive Vulnerability

5.3 A Theory of Vulnerability to Computer Network Infections

5.4 Biological, Chemical and Radiological Weapons

5.4.1 Introduction

5.4.2 Vulnerability to Radiological Dispersion Devices

5.4.3 Vulnerability to Biological Threats

5.4.4 Vulnerability to External Contaminants; Bypassing Building Filtration

5.4.5 Vulnerability to Chemical Threats

5.5 The Visual Compromise of Information

5.6 Summary

Chapter 6 Mitigating Security Risk: Reducing Vulnerability

6.0 Introduction

6.1 Audible Signals

6.1.1 Acoustic Barriers

6.1.2 Sound Reflection

6.1.3 Sound Absorption

6.2 Electromagnetic Signals

6.2.1 Electromagnetic Shielding

6.2.2 Intra-Building Electromagnetic Signal Propagation

6.2.3 Inter-Building Electromagnetic Signal Propagation

6.2.4 Non-Point Source Electromagnetic Radiation

6.3 Vehicle-borne Explosive Threats: Barriers and Bollards

6.4 Explosive Threats

6.5 Radiological Threats

6.6 Biological Threats

6.6.1 Particulate Filtering

6.6.2 Ultraviolet Germicidal Irradiation (UVGI)

6.6.3 Combining UVGI with Particulate Filtering

6.6.4 More Risk Mitigation for Biological Threats

6.6.5 Relative Effectiveness of Influenza Mitigation

6.7 Mitigating the Risk of Chemical Threats (briefly noted)

6.8 Guidelines on Reducing the Vulnerability to Non-Traditional Threats in Commercial Facilities

6.9 Commercial Technical Surveillance Countermeasures (TSCM)

6.10 Electromagnetic Pulse (EMP) Weapons

6.11 Summary

Epilogue

Appendix A

Appendix B

Appendix C

Appendix D

Appendix E

Appendix F

Appendix G

296 pages
Trim Size 7 1/2 X 9 1/4 in, Softcover

Po otrzymaniu zamówienia poinformujemy,
czy wybrany tytuł polskojęzyczny lub anglojęzyczny jest aktualnie na półce księgarni.

 
Wszelkie prawa zastrzeżone PROPRESS sp. z o.o. 2012-2022