Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

References > References - Pg. 212

212 CHAPTER 10 Risk Assessment Techniques References [1] Top 100 Network Security Tools. SecTools.Org. http://sectools.org (accessed 20.01.11). [2] NIST 800-37, Guide for Applying the Risk Management Framework to Federal Informa- tion Systems. http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf (accessed 29.12.09). [3] T.R. Peltier, Information Security Risk Analysis, second ed., Auerbach Publications, Boca Raton, FL, 2005. [4] SANS Institute, 20 Critical Security Controls for Effective Cyber Defense. www.sans .org/critical-security-controls (accessed 19.05.10). [5] BITS Standardized Information Gathering (SIG) questionnaire. www.sharedassessments.org (accessed 02.02.11).