Risk analysis and the security survey

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: Broder, James F.
Kaituhi rangatōpū: ebrary, Inc
Ētahi atu kaituhi: Tucker, Eugene
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Waltham, Mass. : Butterworth-Heinemann, 2012.
Putanga:4th ed.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • Machine generated contents note: Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Management and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Emergency Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant.