<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Risk analysis and security countermeasure selection</title>
  </titleInfo>
  <name type="personal">
    <namePart>Norman, Thomas L.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
    <role>
      <roleTerm type="text">author.</roleTerm>
    </role>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="marc">bibliography</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">flu</placeTerm>
    </place>
    <dateIssued encoding="marc">2016</dateIssued>
    <edition>Second edition.</edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>xxxiii, 449 pages : illustrations ; 26 cm.</extent>
  </physicalDescription>
  <tableOfContents>Risk Analysis — The Basis for Appropriate and Economical Countermeasures (Page-3), Risk Analysis Basics and the Department of Homeland Security-Approved Risk Analysis Methods (Page-21), Risk Analysis Skills and Tools (Page-41), Critical Thinking and the Risk Analysis Process (Page-71), Asset Characterization and Identification (Page-91), Criticality and Consequence Analysis (Page-109), Threat Analysis (Page-121), Assessing Vulnerability (Page-155), Estimating Probability (Page-179), The Risk Analysis Process (Page-195), Prioritizing Risk (Page-215), Security Policy Introduction (Page-229), Security Policy and Countermeasure Goals (Page-241), Developing Effective Security Policies (Page-263), Countermeasure Goals and Strategies (Page-279), Types of Countermeasures (Page-301), Countermeasure Selection and Budgeting Tools (Page-343), Security Effectiveness Metrics (Page-359), Cost-Effectiveness Metrics (Page-381), Writing Effective Reports (Page-411), Q&amp;A (Page-432).</tableOfContents>
  <note type="statement of responsibility">Thomas L. Norman.</note>
  <subject authority="lcsh">
    <topic>Security systems</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Business enterprises</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Office buildings</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Risk assessment</topic>
  </subject>
  <classification authority="lcc">HV8290 .N67 2016</classification>
  <classification authority="ddc" edition="23">355.3433,NOR</classification>
  <identifier type="isbn">9781482244199 (hardcover : alk. paper)</identifier>
  <identifier type="lccn">2015025606</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg">DLC</recordContentSource>
    <recordCreationDate encoding="marc">150702</recordCreationDate>
    <recordChangeDate encoding="iso8601">20230114153253.0</recordChangeDate>
    <recordIdentifier>18685246</recordIdentifier>
    <languageOfCataloging>
      <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
    </languageOfCataloging>
  </recordInfo>
</mods>
