Learning how to model security problem and evaluate operational information security and its financial implications can be a challenging task. The challenge is basically due to the complexity of information security, and it represents a problematic issue in today?s computing. In attempting to tackle such an issue, we offer security professionals and academic researchers a new tool, called the ISMM model, as a result of a structured research methodology that takes into account both of the quantitative and qualitative research approaches to validate the proposed work. The ISMM model is neither based on a specific technology or product, nor a particular business process, but rather an engineering approach towards controlled and efficient implementation of these elements. The model has the following characteristics: 1) it bounds the security problem and defines its conceptual perimeters, 2) a layered architecture, 3) integrative in terms of security layers, controls and processes, and yet 4) independent of security controls and threats. Such properties are believed significant to offer plausible tools for various evaluation purposes in information security engineering practices.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Learning how to model security problem and evaluate operational information security and its financial implications can be a challenging task. The challenge is basically due to the complexity of information security, and it represents a problematic issue in today's computing. In attempting to tackle such an issue, we offer security professionals and academic researchers a new tool, called the ISMM model, as a result of a structured research methodology that takes into account both of the quantitative and qualitative research approaches to validate the proposed work. The ISMM model is neither based on a specific technology or product, nor a particular business process, but rather an engineering approach towards controlled and efficient implementation of these elements. The model has the following characteristics: 1) it bounds the security problem and defines its conceptual perimeters, 2) a layered architecture, 3) integrative in terms of security layers, controls and processes, and yet 4) independent of security controls and threats. Such properties are believed significant to offer plausible tools for various evaluation purposes in information security engineering practices.
MASc., MBA, CISSP. King Saud University, Saudi Arabia: Several years of experience in information and communication systems. Currently is a PhD candidate in the department of Electrical and Computer Engineering at the University of Waterloo, Canada, and is extending his research in the direction of applying reliability theory in security domain.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 28,67 für den Versand von Vereinigtes Königreich nach USA
Versandziele, Kosten & DauerEUR 7,67 für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: Best Price, Torrance, CA, USA
Zustand: New. SUPER FAST SHIPPING. Bestandsnummer des Verkäufers 9783639198478
Anzahl: 2 verfügbar
Anbieter: Lucky's Textbooks, Dallas, TX, USA
Zustand: New. Bestandsnummer des Verkäufers ABLING22Oct2817100450957
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9783639198478
Anzahl: Mehr als 20 verfügbar
Anbieter: California Books, Miami, FL, USA
Zustand: New. Bestandsnummer des Verkäufers I-9783639198478
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9783639198478
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9783639198478_new
Anzahl: Mehr als 20 verfügbar
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
Paperback. Zustand: New. Bestandsnummer des Verkäufers 6666-IUK-9783639198478
Anzahl: 10 verfügbar
Anbieter: moluna, Greven, Deutschland
Kartoniert / Broschiert. Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Alaboodi Saad SalehMASc., MBA, CISSP. King Saud University, Saudi Arabia: Several years of experience in information and communication systems. Currently is a PhD candidate in the department of Electrical and Computer Engineering at . Bestandsnummer des Verkäufers 4966331
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Learning how to model security problem and evaluate operational information security and its financial implications can be a challenging task. The challenge is basically due to the complexity of information security, and it represents a problematic issue in today s computing. In attempting to tackle such an issue, we offer security professionals and academic researchers a new tool, called the ISMM model, as a result of a structured research methodology that takes into account both of the quantitative and qualitative research approaches to validate the proposed work. The ISMM model is neither based on a specific technology or product, nor a particular business process, but rather an engineering approach towards controlled and efficient implementation of these elements. The model has the following characteristics: 1) it bounds the security problem and defines its conceptual perimeters, 2) a layered architecture, 3) integrative in terms of security layers, controls and processes, and yet 4) independent of security controls and threats. Such properties are believed significant to offer plausible tools for various evaluation purposes in information security engineering practices. Bestandsnummer des Verkäufers 9783639198478
Anzahl: 2 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
Paperback. Zustand: Like New. Like New. book. Bestandsnummer des Verkäufers ERICA79036391984766
Anzahl: 1 verfügbar