|
|
|
|
| LEADER |
00000nam a2200000 a 4500 |
| 001 |
67306 |
| 003 |
CZ-ZlUTB |
| 005 |
20251006165710.0 |
| 006 |
m d |
| 007 |
cr cn |
| 008 |
130426s2011 xxu s 001 0 eng d |
| 020 |
|
|
|a 9781597496155
|
| 040 |
|
|
|a ZLD002
|b cze
|
| 072 |
|
7 |
|a 004
|x Počítačová věda. Výpočetní technika. Informační technologie
|2 Konspekt
|9 23
|
| 080 |
|
|
|a 004.056
|2 MRF
|
| 080 |
|
|
|a 004.7.056
|2 MRF
|
| 080 |
|
|
|a 005.334:005.332.3
|2 MRF
|
| 080 |
|
|
|a (0.034.2:08)
|2 MRF
|
| 100 |
1 |
|
|a Wheeler, Evan
|7 utb2013757536
|4 aut
|
| 245 |
1 |
0 |
|a Security risk management
|h [elektronický zdroj] :
|b building an information security risk management program from the ground up /
|c Evan Wheeler
|
| 260 |
|
|
|a Waltham, MA :
|b Syngress,
|c 2011
|
| 300 |
|
|
|a 1 online zdroj (xxi, 340 s.)
|
| 500 |
|
|
|a Název z titulní obrazovky
|
| 504 |
|
|
|a Obsahuje bibliografické odkazy a rejstřík
|
| 505 |
0 |
|
|a Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables
|
| 506 |
|
|
|a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity
|
| 533 |
|
|
|a Elektronická reprodukce
|
| 538 |
|
|
|a Způsob přístupu: World Wide Web
|
| 650 |
0 |
7 |
|a informační bezpečnost
|7 ph136652
|2 czenas
|
| 650 |
0 |
7 |
|a počítačová bezpečnost
|7 ph165952
|2 czenas
|
| 650 |
0 |
7 |
|a zabezpečení počítačových sítí
|7 ph127513
|2 czenas
|
| 650 |
0 |
7 |
|a rizikový management
|7 ph116047
|2 czenas
|
| 650 |
0 |
9 |
|a information security
|2 eczenas
|
| 650 |
0 |
9 |
|a computer security
|2 eczenas
|
| 650 |
0 |
9 |
|a computer network security
|2 eczenas
|
| 650 |
0 |
9 |
|a risk management
|2 eczenas
|
| 655 |
|
7 |
|a elektronické knihy
|7 fd186907
|2 czenas
|
| 655 |
|
9 |
|a electronic books
|2 eczenas
|
| 710 |
2 |
|
|a Elsevier Science (firma)
|7 ko2002102447
|
| 856 |
4 |
1 |
|u https://proxy.k.utb.cz/login?url=http://www.sciencedirect.com/science/book/9781597496155
|
| 910 |
|
|
|a ZLD002
|
| 992 |
|
|
|a BK
|b SK
|c EBOOK-TN
|c ELSEVIER
|
| 999 |
|
|
|c 67306
|d 67306
|
| 993 |
|
|
|x NEPOSILAT
|y EIZ
|