Learning how to model security problem and evaluate operational information security and its financial implications can be a challenging task. The challenge is basically due to the complexity of information security, and it represents a problematic issue in today?s computing. In attempting to tackle such an issue, we offer security professionals and academic researchers a new tool, called the ISMM model, as a result of a structured research methodology that takes into account both of the quantitative and qualitative research approaches to validate the proposed work. The ISMM model is neither based on a specific technology or product, nor a particular business process, but rather an engineering approach towards controlled and efficient implementation of these elements. The model has the following characteristics: 1) it bounds the security problem and defines its conceptual perimeters, 2) a layered architecture, 3) integrative in terms of security layers, controls and processes, and yet 4) independent of security controls and threats. Such properties are believed significant to offer plausible tools for various evaluation purposes in information security engineering practices.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
MASc., MBA, CISSP. King Saud University, Saudi Arabia: Several years of experience in information and communication systems. Currently is a PhD candidate in the department of Electrical and Computer Engineering at the University of Waterloo, Canada, and is extending his research in the direction of applying reliability theory in security domain.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 28,79 per la spedizione da Regno Unito a U.S.A.
Destinazione, tempi e costiEUR 3,42 per la spedizione in U.S.A.
Destinazione, tempi e costiDa: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLING22Oct2817100450957
Quantità: Più di 20 disponibili
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9783639198478
Quantità: Più di 20 disponibili
Da: California Books, Miami, FL, U.S.A.
Condizione: New. Codice articolo I-9783639198478
Quantità: Più di 20 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9783639198478
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783639198478_new
Quantità: Più di 20 disponibili
Da: Chiron Media, Wallingford, Regno Unito
Paperback. Condizione: New. Codice articolo 6666-IUK-9783639198478
Quantità: 10 disponibili
Da: moluna, Greven, Germania
Kartoniert / Broschiert. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Alaboodi Saad SalehMASc., MBA, CISSP. King Saud University, Saudi Arabia: Several years of experience in information and communication systems. Currently is a PhD candidate in the department of Electrical and Computer Engineering at . Codice articolo 4966331
Quantità: Più di 20 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Learning how to model security problem and evaluate operational information security and its financial implications can be a challenging task. The challenge is basically due to the complexity of information security, and it represents a problematic issue in today s computing. In attempting to tackle such an issue, we offer security professionals and academic researchers a new tool, called the ISMM model, as a result of a structured research methodology that takes into account both of the quantitative and qualitative research approaches to validate the proposed work. The ISMM model is neither based on a specific technology or product, nor a particular business process, but rather an engineering approach towards controlled and efficient implementation of these elements. The model has the following characteristics: 1) it bounds the security problem and defines its conceptual perimeters, 2) a layered architecture, 3) integrative in terms of security layers, controls and processes, and yet 4) independent of security controls and threats. Such properties are believed significant to offer plausible tools for various evaluation purposes in information security engineering practices. Codice articolo 9783639198478
Quantità: 2 disponibili
Da: Mispah books, Redhill, SURRE, Regno Unito
Paperback. Condizione: Like New. Like New. book. Codice articolo ERICA79036391984766
Quantità: 1 disponibili