03873nam 2200733 a 450 991046010780332120200520144314.01-84928-129-71-282-52904-897866125290471-84928-007-X(CKB)2670000000067713(EBL)547041(OCoLC)700919041(SSID)ssj0000671269(PQKBManifestationID)11402545(PQKBTitleCode)TC0000671269(PQKBWorkID)10613648(PQKB)11316229(MiAaPQ)EBC547041(WaSeSS)IndRDA00053795(CaSebORM)9781849281294(Au-PeEL)EBL547041(CaPaEBR)ebr10439457(CaONFJC)MIL252904(EXLCZ)99267000000006771320110127d2009 uy 0engur|n|---|||||txtccrThe definitive guide to the C&A transformation[electronic resource] the first publication of a comprehensive view of the C&A transformation /Julie E. Mehan, Waylon Krush1st editionEly, U.K. IT Governance Pub.20091 online resource (601 p.)Description based upon print version of record.1-84928-006-1 Includes bibliographical references.INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS - ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES - THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION - PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE - CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN - MAINTAINING AUTHORIZATIONCHAPTER 9: REMOVE THE INFORMATION SYSTEM FROM OPERATIONCHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE; CHAPTER 11: C&A IN THE US DEPARTMENT OF DEFENSE; CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT; CHAPTER 13: THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA); CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC); CHAPTER 15: INFORMATION SYSTEMS SECURITY TRAINING AND CERTIFICATION; CHAPTER 16: THE FUTURE - REVITALIZING AND TRANSFORMING C&A; THE RESOURCE CD; GLOSSARY; ACRONYMS'The Definitive Guide to the C&A Transformation' is the first comprehensive manual that sets out to explain the current standards and best practices. The book provides all the information needed to recognize, implement and manage the relevant authorization requirements, and therefore to achieve compliance with federal, local and agency laws and policies. Each chapter not only provides a list of related references but also offers recommendations for additional reading.Definitive guide to the certification and accreditation transformationComputer securityComputer networksCertificationInformation technologySecurity measuresInformation technologyCertificationData protectionElectronic books.Computer security.Computer networksCertification.Information technologySecurity measures.Information technologyCertification.Data protection.005.74Mehan Julie E891538Krush Waylon1048016MiAaPQMiAaPQMiAaPQBOOK9910460107803321The definitive guide to the C&A transformation2475982UNINA