Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 2 of 2 matches in All Departments
Other books on information security metrics discuss number
theory and statistics in academic terms. Light on mathematics and
heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics
to Information Security breaks the mold. This is the ultimate
how-to-do-it guide for security metrics.
The PRAGMATIC approach lets you hone in on your problem areas and identify the few metrics that will generate real business value. The book:
In addition to its obvious utility in the information security
realm, the PRAGMATIC approach, introduced for the first time in
this book, has broader application across diverse fields of
management including finance, human resources, engineering, and
production in fact any area that suffers a surplus of data but a
deficit of useful information. Visit Security Metametrics. Security Metametrics supports the global community of professionals adopting the innovative techniques laid out in "PRAGMATIC Security Metrics." If you, too, are struggling to make much sense of security metrics, or searching for better metrics to manage and improve information security, Security Metametrics is the place. http: //securitymetametrics.com/
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement offers a radical new approach for developing and implementing security metrics essential for supporting business activities and managing information risk. This work provides anyone with security and risk management responsibilities insight into these critical security questions:How secure is my organization? How much security is enough? What are the most cost-effective security solutions? How secure is my organization? You can't manage what you can't measure This volume shows readers how to develop metrics that can be used across an organization to assure its information systems are functioning, secure, and supportive of the organization's business objectives. It provides a comprehensive overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments. Later chapters explore ways to develop effective strategic and management metrics for information security governance, risk management, program implementation and management, and incident management and response. The book ensures that every facet of security required by an organization is linked to business objectives, and provides metrics to measure it. Case studies effectively demonstrate specific ways that metrics can be implemented across an enterprise to maximize business benefit. With three decades of enterprise information security experience, author Krag Brotby presents a workable approach to developing and managing cost-effective enterprise information security.
|
You may like...
The Inbetweeners Movie 2
James Buckley, Emily Berrington, …
Blu-ray disc
(1)
R32 Discovery Miles 320
|