03686oam 2200661I 450 991046289330332120200520144314.00-429-11156-81-4398-8153-710.1201/b14047 (CKB)2670000000341605(EBL)1153198(OCoLC)831118565(SSID)ssj0000905647(PQKBManifestationID)11491739(PQKBTitleCode)TC0000905647(PQKBWorkID)10926518(PQKB)11092043(MiAaPQ)EBC1153198(CaSebORM)9781439881538(Au-PeEL)EBL1153198(CaPaEBR)ebr10674495(CaONFJC)MIL502173(EXLCZ)99267000000034160520180331d2013 uy 0engur|n|---|||||txtccrPRAGMATIC security metrics applying metametrics to information security /W. Krag Brotby and Gary Hinson ; preface by M. E. Kabay1st editionBoca Raton, Fla. :CRC Press,2013.1 online resource (507 p.)An Auerbach book--T.p.1-4398-8152-9 Includes bibliographical references.Front Cover; Contents; Foreword; Preface; Acknowledgments; Office Memorandum; Chapter 1 - Introduction; Chapter 2 - Why Measure Information Security?; Chapter 3 - The Art and Science of Security Metrics; Chapter 4 - Audiences for Security Metrics; Chapter 5 - Finding Candidate Metrics; Chapter 6 - Metametrics and the PRAGMATIC Approach; Chapter 7 - 150+ Example Security Metrics; Chapter 8 - Designing PRAGMATIC Security Measurement System; Chapter 9 - Advanced Information Security Metrics; Chapter 10 - Downsides of Metrics; Chapter 11 - Using PRAGMATIC Metrics in PracticeChapter 12 - Case StudyChapter 13 - Conclusions; Appendix A: PRAGMATIC Criteria; Appendix B: Business Model of Information Security (BMIS); Appendix C: Capability Maturity Model (CMM); Appendix D: Example Opinion Survey Form; Appendix E: SABSA Security Attributes Table; Appendix F: Prototype Metrics Catalog; Appendix G: Effect of Weighting the PRAGMATIC Criteria; Appendix H: ISO27k Maturity Scale Metrics; Appendix I: Sample Management Survey; Appendix J: Observer Bias; Appendix K: Observer Calibration; Appendix L: Bibliography; Back CoverOther books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to help: Security professionals systBusiness enterprisesComputer networksSecurity measuresComputer securityData protectionElectronic books.Business enterprisesComputer networksSecurity measures.Computer security.Data protection.658.478Brotby W. Krag.862239Hinson Gary1038411Kabay Michel E1038412MiAaPQMiAaPQMiAaPQBOOK9910462893303321PRAGMATIC security metrics2459974UNINA02038nam 2200469 n 450 99639540580331620221108090436.0(CKB)3810000000012936(EEBO)2248546326(UnM)9959005500971(EXLCZ)99381000000001293619990407d1685 uy engurbn||||a|bb|At the angel and crown in Basing-lane, the second turning in Bread-street from Cheapside, dwells J. Pechey, a graduate in the University of Oxford, and a member of the College of Physicians in London[electronic resource] who has a pill prepared with wholsom ingredients, ..[London s.n.1685?]1 sheet ([1] p.)Imprint from Wing.Title from caption and first lines of text.Item at reel position E8:2[233] imperfect: faded at foot, affecting text.Reproduction of original in the British Library.eebo-0018AdvertisingDrugsEarly works to 1800MedicineFormulae, receipts, prescriptionsEarly works to 1800Medicine, popularEarly works to 1800PhysiciansEnglandEarly works to 1800Sexually transmitted diseasesEnglandEarly works to 1800ScurvyEnglandEarly works to 1800BroadsidesEngland17th century.rbgenrAdvertisingDrugsMedicineFormulae, receipts, prescriptionsMedicine, popularPhysiciansSexually transmitted diseasesScurvyPechey John1655-1716.1001834Cu-RivESCu-RivESBOOK996395405803316At the angel and crown in Basing-lane, the second turning in Bread-street from Cheapside, dwells J. Pechey, a graduate in the University of Oxford, and a member of the College of Physicians in London2326264UNISA