top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush
Autore Mehan Julie E
Edizione [1st edition]
Pubbl/distr/stampa Ely, U.K., : IT Governance Pub., 2009
Descrizione fisica 1 online resource (601 p.)
Disciplina 005.74
Altri autori (Persone) KrushWaylon
Soggetto topico Computer security
Computer networks - Certification
Information technology - Security measures
Information technology - Certification
Data protection
Soggetto genere / forma Electronic books.
ISBN 1-84928-129-7
1-282-52904-8
9786612529047
1-84928-007-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS - ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES - THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION - PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE - CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN - MAINTAINING AUTHORIZATION
CHAPTER 9: REMOVE THE INFORMATION SYSTEM FROM OPERATIONCHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE; CHAPTER 11: C&A IN THE US DEPARTMENT OF DEFENSE; CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT; CHAPTER 13: THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA); CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC); CHAPTER 15: INFORMATION SYSTEMS SECURITY TRAINING AND CERTIFICATION; CHAPTER 16: THE FUTURE - REVITALIZING AND TRANSFORMING C&A; THE RESOURCE CD; GLOSSARY; ACRONYMS
Altri titoli varianti Definitive guide to the certification and accreditation transformation
Record Nr. UNINA-9910460107803321
Mehan Julie E  
Ely, U.K., : IT Governance Pub., 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush
Autore Mehan Julie E
Edizione [1st edition]
Pubbl/distr/stampa Ely, U.K., : IT Governance Pub., 2009
Descrizione fisica 1 online resource (601 p.)
Disciplina 005.74
Altri autori (Persone) KrushWaylon
Soggetto topico Computer security
Computer networks - Certification
Information technology - Security measures
Information technology - Certification
Data protection
ISBN 1-84928-129-7
1-282-52904-8
9786612529047
1-84928-007-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS - ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES - THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION - PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE - CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN - MAINTAINING AUTHORIZATION
CHAPTER 9: REMOVE THE INFORMATION SYSTEM FROM OPERATIONCHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE; CHAPTER 11: C&A IN THE US DEPARTMENT OF DEFENSE; CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT; CHAPTER 13: THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA); CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC); CHAPTER 15: INFORMATION SYSTEMS SECURITY TRAINING AND CERTIFICATION; CHAPTER 16: THE FUTURE - REVITALIZING AND TRANSFORMING C&A; THE RESOURCE CD; GLOSSARY; ACRONYMS
Altri titoli varianti Definitive guide to the certification and accreditation transformation
Record Nr. UNINA-9910785672503321
Mehan Julie E  
Ely, U.K., : IT Governance Pub., 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush
Autore Mehan Julie E
Edizione [1st edition]
Pubbl/distr/stampa Ely, U.K., : IT Governance Pub., 2009
Descrizione fisica 1 online resource (601 p.)
Disciplina 005.74
Altri autori (Persone) KrushWaylon
Soggetto topico Computer security
Computer networks - Certification
Information technology - Security measures
Information technology - Certification
Data protection
ISBN 1-84928-129-7
1-282-52904-8
9786612529047
1-84928-007-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS - ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES - THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION - PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE - CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN - MAINTAINING AUTHORIZATION
CHAPTER 9: REMOVE THE INFORMATION SYSTEM FROM OPERATIONCHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE; CHAPTER 11: C&A IN THE US DEPARTMENT OF DEFENSE; CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT; CHAPTER 13: THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA); CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC); CHAPTER 15: INFORMATION SYSTEMS SECURITY TRAINING AND CERTIFICATION; CHAPTER 16: THE FUTURE - REVITALIZING AND TRANSFORMING C&A; THE RESOURCE CD; GLOSSARY; ACRONYMS
Altri titoli varianti Definitive guide to the certification and accreditation transformation
Record Nr. UNINA-9910826466903321
Mehan Julie E  
Ely, U.K., : IT Governance Pub., 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal cloud computing : the definitive guide for cloud service providers / / Matthew Metheny ; technical editor, Waylon Krush
Federal cloud computing : the definitive guide for cloud service providers / / Matthew Metheny ; technical editor, Waylon Krush
Autore Metheny Matthew
Edizione [Second edition.]
Pubbl/distr/stampa Cambridge, MA : , : Syngress, , [2017]
Descrizione fisica 1 online resource (1 volume) : illustrations
Soggetto topico Cloud computing - Government policy - United States
Computer security - Government policy - United States
ISBN 0-12-809687-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction to the federal cloud computing strategy -- Cloud computing standards -- A case for open source -- Security and privacy in public cloud computing -- Applying the NIST risk management framework -- Risk management -- Comparison of FISMA with other security compliance standards -- FedRAMP primer -- The FedRAMP cloud computing security requirements -- Assessment and authorization (A & A): governance, preparation, and execution -- Strategies for continuous monitoring -- Cost-effective compliance using security automation appendix -- Federal-focused case study for cloud service providers using the CSA GRC stack.
Record Nr. UNINA-9910583025003321
Metheny Matthew  
Cambridge, MA : , : Syngress, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui