This specific ISBN edition is currently not available.View all copies of this ISBN edition:
When properly conducted, risk analysis enlightens, informs, and illuminates, helping management organize their thinking into properly prioritized, cost-effective action. Poor analysis, on the other hand, usually results in vague programs with no clear direction and no metrics for measurement. Although there is plenty of information on risk analysis, it is rare to find a book that explains this highly complex subject with such startling clarity. Very few, if any, focus on the art of critical thinking and how to best apply it to the task of risk analysis.
The first comprehensive resource to explain how to evaluate the appropriateness of countermeasures, from a cost-effectiveness perspective, Risk Analysis and Security Countermeasure Selection details the entire risk analysis process in language that is easy to understand. It guides readers from basic principles to complex processes in a step-by-step fashion, evaluating DHS–approved risk assessment methods, including CARVER, API/NPRA, RAMCAP, and various Sandia methodologies.
Using numerous case illustrations, the text clearly explains the five core principles of the risk analysis lifecycle―determining assets, threats, vulnerabilities, risks, and countermeasures. It also supplies readers with a completely adaptable graphic risk analysis tool that is simple to use, can be applied in public or private industries, and works with all DHS–approved methods. This reader-friendly guide provides the tools and insight needed to effectively analyze risks and secure facilities in a broad range of industries, including DHS designated critical infrastructure in the chemical, transportation, energy, telecommunications, and public health sectors.
"synopsis" may belong to another edition of this title.
Protection Partners International, Houston, TX USA & Beirut, LebanonReview:
... by following the guidance laid out in this detailed book, security managers can do it themselves with software that’s probably already on their office computers: Microsoft Excel. ... There is no doubt that Norman himself spent considerable time devising the process, which he presents in the book. He provides step-by-step lists for building various matrices ... definitely a book for the advanced security practitioner. ... it outlined an excellent methodology and is well worth the effort required to read it and work through the process outlined by the author.
― Glen Kitteringham, CPP, President of Kitteringham Security Group Inc., in Security Management, January 2011
"About this title" may belong to another edition of this title.
Book Description CRC Press, 2009. Hardcover. Condition: New. 1. Seller Inventory # DADAX1420078704
Book Description CRC Press, 2009. Condition: New. book. Seller Inventory # M1420078704
Book Description CRC Press, 2009. Hardcover. Condition: New. Never used!. Seller Inventory # P111420078704