Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments [Hardcover]

Douglas J. Landoll , Douglas Landoll

List Price: CDN$ 96.53
Price: CDN$ 78.96 & FREE Shipping. Details
You Save: CDN$ 17.57 (18%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 3 to 5 weeks.
Ships from and sold by Amazon.ca. Gift-wrap available.
Save Up to 90% on Textbooks
Hit the books in Amazon.ca's Textbook Store and save up to 90% on used textbooks and 35% on new textbooks. Learn more.
There is a newer edition of this item:
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
CDN$ 73.34
Usually ships in 2 to 4 weeks
Join Amazon Student in Canada


Book Description

Dec 12 2005
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.

This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin.

The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations.

Product Details


Inside This Book (Learn More)
First Sentence
Heavy financial losses, breaches of privacy, and even the downfall of corporations have recently been attributed to the inability of corporations to protect themselves from cyber-risks. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  7 reviews
8 of 9 people found the following review helpful
5.0 out of 5 stars Reduce your information risks with this book Aug. 20 2008
By G. Choo - Published on Amazon.com
Format:Hardcover
I manage information risks for a large organization on a professional basis and this is one of the best books I have read on this important topic. What I found most useful about this book is that it complements rather than competes with formal risk management methods. This book explains techniques and methods that you can use to enhance your existing risk assessment process like data gathering, impact analysis, evaluations and so on. This book should belong on every risk managers bookshelf.
5 of 6 people found the following review helpful
5.0 out of 5 stars A Great Way to Learn about Threat Risk Analysis March 24 2008
By Red - Published on Amazon.com
Format:Hardcover
I am taking a class on Threat Risk Assessment and one of our main references is Douglas Landoll's "The Security Risk Assessment Handbook". The great thing about this book is that it takes what would normally be extremely dry material and makes it interesting. The book has a conversational tone which is easy to read, and yet still manages to be very informative. A great tool for anyone who wants to learn about security assessments.
5.0 out of 5 stars Great book ! July 28 2013
By Beth Flasker - Published on Amazon.com
Format:Hardcover|Verified Purchase
For all those IT people who aren't extremely technical, should seriously consider getting into CISSP or CISA certification and this as a great read and reference to this line of work.
5.0 out of 5 stars Excelent Oct. 11 2012
By samrobin - Published on Amazon.com
Format:Hardcover
In his book, "The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments", Landoll transforms what is usually a dry topic into a subject that captures the interest of even the most "technically simple" reader. After reading only a few pages, it becomes clear that Landoll is an expert in this field.

He describes the process of conducting risk assessments, giving reason to and explaining each step along the way. Any questions that the reader may develop are answered. By the end of the book, the reader will know everything there is to know about risk assessments. I highly recommend this read to anyone who is seeking to learn about this subject without feeling as if you were reading a dictionary.
5.0 out of 5 stars A must resource in a CISO's library March 30 2010
By Daniel Nunez - Published on Amazon.com
Format:Hardcover|Verified Purchase
Dear Mr. Doug Landoll,

I have to give you Kudo's on your book. I just bought it and its awesome!!!! There is a section that is so well written regarding the reporting structure of security and how successful the program will be based on InfoSec placement and support. I've never seen it written so well before. Your book will be a career long reference. I hope you write more books.

Take care,
Daniel Nunez, CISSP, CISM

Look for similar items by category


Feedback