Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Risk Analysis and the Security Survey

Risk Analysis and the Security Survey

List Price: $59.95
Your Price: $56.95
Product Info Reviews

<< 1 >>

Rating: 3 stars
Summary: Review after using Risk Analysis and the Security Survey
Review: I bought the book to use as a reference while doing my very first risk analysis. It helped me a lot with my project. I found it easy to read and use as a reference. I used the format in the book as a guide when writing up the risk analysis I did.

If you haven't done one before and are looking for a good reference guide, this is a great resource.

Rating: 3 stars
Summary: Review after using Risk Analysis and the Security Survey
Review: I bought the book to use as a reference while doing my very first risk analysis. It helped me a lot with my project. I found it easy to read and use as a reference. I used the format in the book as a guide when writing up the risk analysis I did.

If you haven't done one before and are looking for a good reference guide, this is a great resource.

Rating: 5 stars
Summary: clear direction on putting together a security survey
Review: I have prepared several security surveys throughout the last couple of years and have always found that they were missing something. Once I started looking through this book I was given clear direction on the useful information required when conducting a security survey.
This book describes all the main sections required for a security review: Scoop of the project, organization assesment and requirements, physical security, internal controls, data system and records, emergency planning, and proprietary information, business impact analysis, survey questionary, etc.
This book goes into details on planning and analysis but does not give detailed techniques on aquireing information or what an effective security system looks like. It assumes the reader has a strong security background and is able to handle the details of investigation, interviewing, testing and evaluation. This book only touches on these topics.


<< 1 >>

© 2004, ReviewFocus or its affiliates