Search preferences
Skip to main search results

Search filters

Product Type

  • All Product Types 
  • Books (1)
  • Magazines & Periodicals (No further results match this refinement)
  • Comics (No further results match this refinement)
  • Sheet Music (No further results match this refinement)
  • Art, Prints & Posters (No further results match this refinement)
  • Photographs (No further results match this refinement)
  • Maps (No further results match this refinement)
  • Manuscripts & Paper Collectibles (No further results match this refinement)

Condition Learn more

  • New (1)
  • As New, Fine or Near Fine (No further results match this refinement)
  • Very Good or Good (No further results match this refinement)
  • Fair or Poor (No further results match this refinement)
  • As Described (No further results match this refinement)

Binding

Collectible Attributes

  • First Edition (No further results match this refinement)
  • Signed (No further results match this refinement)
  • Dust Jacket (No further results match this refinement)
  • Seller-Supplied Images (No further results match this refinement)
  • Not Print on Demand (1)

Language (1)

Price

  • Any Price 
  • Under US$ 25 (No further results match this refinement)
  • US$ 25 to US$ 50 (No further results match this refinement)
  • Over US$ 50 
Custom price range (US$)

Free Shipping

  • Free Shipping to U.S.A. (No further results match this refinement)

Seller Location

  • US$ 64.50

    US$ 18.00 shipping from China to U.S.A.

    Quantity: 1 available

    Add to basket

    paperback. Condition: New. Pub Date :2005-06-01 Pages: 206 Publisher: China Standard Press risk assessment should be based on the organization as the main body. the research organization of the relationship between the target and Information Security; to meet organizational goals as a starting point. to carry out the goals of information security risk assessment and methods. as well as the implementation of the project's research. which became the main idea of ??the information security risk assessment throughout the b.