
Security Metrics, A Beginner's Guide
1st EditionISBN10: 0071744002
ISBN13: 9780071744003
Copyright: 2012
Instructors: choose ebook for fast access or receive a print copy.
Still Have Questions? Contact your Rep s
With the McGraw Hill eBook, students can access their digital textbook on the web or go offline via the ReadAnywhere app for phones or tablets.
McGraw Hill eBook Courses Include:
- Offline reading – study anytime, anywhere
- One interface for all McGraw Hill eBooks
- Highlighting and note-taking
- Syncs across platforms, always up-to-date
- Available for Android and iOS
Rent Monthly
Purchase Options
Students, we’re committed to providing you with high-value course solutions backed by great service and a team that cares about your success. See tabs below to explore options and pricing. Don't forget, we accept financial aid and scholarship funds in the form of credit or debit cards.
The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
Program Details
Chapter 1 Why Measure Security?
Chapter 2 Why Now Security Metrics Are Needed Now
Part II: Essential Components of an Effective Security Metrics Practitioner
Chapter 3 Analytics
Chapter 4 Commitment to Project Management
Part III: Decide What to Measure
Chapter 5 Identify Core Competencies, Information Security Work, and Resourcing Options
Chapter 6 Identify Targets
Part IV: Get Started
Chapter 7 Defining Project Objectives
Chapter 8 Define Your Priorities
Chapter 9 Identify Key Messages and Key Audiences
Chapter 10 Obtain Buy-In from Stakeholders
Part V: Toolkit
Chapter 11 Automation
Chapter 12 Analysis Technology and a Case Study
Part VI: Creating the Best Environment for Healthy Metrics
Chapter 13 Define a Communications Strategy
Chapter 14 Create and Drive an Action Plan: The Importance of Project Management
Part VII: Secret Sauce: Lessons Learned from an Enterprise Practitioner
Chapter 15 Improving Data Quality and Presentation
Chapter 16 Resourcing Security Metrics Projects
Part VIII: Looking Forward
Chapter 17 Security Metrics for Cloud Computing
Part IX: Appendix and Glossary
Appendix A Templates and Checklists
Glossary
Index
About the Author
Caroline Wong
Caroline Wong was the Chief of Staff for the Global Information Security Team at eBay and built eBay's Security Metrics program from the ground up. She is well known for her expertise in the area of Security Metrics and has been a featured speaker at numerous industry conferences, including RSA, Metricon, the Executive Women's Forum, Archer Summits, and the Information Security Forum. Caroline is on the Program Committee for Metricon 4.5 and was nominated as a Finalist for the "One to Watch" Category at the Executive Women's Forum Women of Influence Awards 2009. She has contributed as a technical reviewer to the Center for Information Security Consensus Metrics Definitions and is actively working with the Cloud Security Alliance to define metrics for the cloud computing space. She has a B.S. in Electrical Engineering and Computer Sciences from U.C. Berkeley, a Certificate in Finance and Accounting from Stanford's Executive Education Program, and is CISSP certified.
Chapter 1 Why Measure Security?
Chapter 2 Why Now Security Metrics Are Needed Now
Part II: Essential Components of an Effective Security Metrics Practitioner
Chapter 3 Analytics
Chapter 4 Commitment to Project Management
Part III: Decide What to Measure
Chapter 5 Identify Core Competencies, Information Security Work, and Resourcing Options
Chapter 6 Identify Targets
Part IV: Get Started
Chapter 7 Defining Project Objectives
Chapter 8 Define Your Priorities
Chapter 9 Identify Key Messages and Key Audiences
Chapter 10 Obtain Buy-In from Stakeholders
Part V: Toolkit
Chapter 11 Automation
Chapter 12 Analysis Technology and a Case Study
Part VI: Creating the Best Environment for Healthy Metrics
Chapter 13 Define a Communications Strategy
Chapter 14 Create and Drive an Action Plan: The Importance of Project Management
Part VII: Secret Sauce: Lessons Learned from an Enterprise Practitioner
Chapter 15 Improving Data Quality and Presentation
Chapter 16 Resourcing Security Metrics Projects
Part VIII: Looking Forward
Chapter 17 Security Metrics for Cloud Computing
Part IX: Appendix and Glossary
Appendix A Templates and Checklists
Glossary
Index
About the Author
Caroline Wong
Caroline Wong was the Chief of Staff for the Global Information Security Team at eBay and built eBay's Security Metrics program from the ground up. She is well known for her expertise in the area of Security Metrics and has been a featured speaker at numerous industry conferences, including RSA, Metricon, the Executive Women's Forum, Archer Summits, and the Information Security Forum. Caroline is on the Program Committee for Metricon 4.5 and was nominated as a Finalist for the "One to Watch" Category at the Executive Women's Forum Women of Influence Awards 2009. She has contributed as a technical reviewer to the Center for Information Security Consensus Metrics Definitions and is actively working with the Cloud Security Alliance to define metrics for the cloud computing space. She has a B.S. in Electrical Engineering and Computer Sciences from U.C. Berkeley, a Certificate in Finance and Accounting from Stanford's Executive Education Program, and is CISSP certified.
Shipping Options
- Standard
- Next day air
- 2nd day air
- 3rd day air
Rent Now
You will be taken to our partner Chegg.com to complete your transaction.
After completing your transaction, you can access your course using the section url supplied by your instructor.