Home Page Icon
Home Page
Table of Contents for
Appendix B Contents
Close
Appendix B Contents
by Douglas W. Hubbard, Richard Seiersen
How to Measure Anything in Cybersecurity Risk, 2nd Edition
Cover
Title Page
Copyright
Dedication
Foreword for the Second Edition
Acknowledgments
Preface
Introduction
PART I: Why Cybersecurity Needs Better Measurements for Risk
PART II: Evolving the Model of Cybersecurity Risk
PART III: Cybersecurity Risk Management for the Enterprise
APPENDIX A: Selected Distributions
APPENDIX B: Guest Contributors
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
APPENDIX B: Guest Contributors
Next
Next Chapter
Decision Analysis to Support Ransomware Cybersecurity Risk Management
Appendix B
Contents
Decision Analysis to Support Ransomware Cybersecurity Risk Management
Robert D. Brown III
Bayesian Networks: One Solution for Specific Challenges in Building ML Systems in Cybersecurity
Rob Mealey
The Flaw of Averages in Cyber Security
Sam Savage
Password Hacking
Anton Mobley
How Catastrophe Modeling Can Be Applied to Cyber Risk
Scott Stransky and Tomas Girnius
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset