4 Results Found Subscribe to search results
0000IIE
Print
1. 
Cover image for Hacking exposed : mobile security secrets & solutions
by 
Bergman, Neil.
Format: 
Books
Publication Date 
2013
Excerpt: 
permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment
Available:
Copies:
2. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
, Threats, Sources, and Events / S. Haugen -- 13.2.4.Risk Analysis, Risk Evaluation, and Risk Assessment / S
Available:
Copies:
3. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
. The risk assessment and statement of applicability -- 7. External parties -- 8. Asset management -- 9
Available:
Copies:
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Available:
Copies:
Limit Search Results
Access Level
Format
Material Type
Language
Library
Shelf Location
Publication Date
Item Available
Advanced Search Location