| 000 | 02475cam a2200289 a 4500 | ||
|---|---|---|---|
| 008 | 120710s2012 nyua 001 0 eng | ||
| 010 | _a2011043857 | ||
| 020 | _a9780071744003 | ||
| 020 | _a0071744002 | ||
| 035 | _a(Sirsi) u8353 | ||
| 040 |
_aEG-CaNU _cEG-CaNU _dEG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 0 |
_a005.8 _2 23 |
| 100 | 1 |
_aWong, Caroline. _915400 |
|
| 245 | 1 | 0 |
_aSecurity metrics : _b a beginner’s guide / _c Caroline Wong. |
| 260 |
_aNew York : _b McGraw-Hill, _c c2012. |
||
| 300 |
_axxxii, 397 p. : _b ill. ; _c 24 cm. |
||
| 500 | _aIncludes index. | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aPart I: Why Security Metrics -- Chapter 1 Why Measure Security' -- Chapter 2 Why Now Security Metrics Are Needed Now -- Part II: Essential Components of an Effective Security Metrics Practitioner -- Chapter 3 Analytics -- Chapter 4 Commitment to Project Management -- Part III: Decide What to Measure -- Chapter 5 Identify Core Competencies, Information Security Work, and Resourcing Options -- Chapter 6 Identify Targets -- Part IV: Get Started -- Chapter 7 Defining Project Objectives -- Chapter 8 Define Your Priorities -- Chapter 9 Identify Key Messages and Key Audiences -- Chapter 10 Obtain Buy-In from Stakeholders -- Part V: Toolkit -- Chapter 11 Automation -- Chapter 12 Analysis Technology and a Case Study -- Part VI: Creating the Best Environment for Healthy Metrics -- Chapter 13 Define a Communications Strategy -- Chapter 14 Create and Drive an Action Plan: The Importance of Project Management -- Part VII: Secret Sauce: Lessons Learned from an Enterprise Practitioner -- Chapter 15 Improving Data Quality and Presentation -- Chapter 16 Resourcing Security Metrics Projects -- Part VIII: Looking Forward -- Chapter 17 Security Metrics for Cloud Computing. | |
| 520 | _aThis practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away. | ||
| 650 | 0 |
_aData protection _x Standards. _915401 |
|
| 650 | 0 |
_aMicrocomputers _x Access control. _9454 |
|
| 650 | 0 |
_aComputer security _x Evaluation. _915402 |
|
| 650 | 0 |
_aComputer crimes _x Prevention. _915403 |
|
| 596 | _a1 | ||
| 999 |
_c7256 _d7256 |
||