Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan |
Autore | Mehan Julie E |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, : IT Governance Pub., 2008 |
Descrizione fisica | 1 online resource (281 p.) |
Disciplina | 005.802/18 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards Computer networks - Security measures - Quality control Internet - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-26359-5
9786612263590 1-905356-48-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX |
Record Nr. | UNINA-9910455517103321 |
Mehan Julie E | ||
Ely, : IT Governance Pub., 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan |
Autore | Mehan Julie E |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, : IT Governance Pub., 2008 |
Descrizione fisica | 1 online resource (281 p.) |
Disciplina | 005.802/18 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards Computer networks - Security measures - Quality control Internet - Security measures |
ISBN |
1-282-26359-5
9786612263590 1-905356-48-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX |
Record Nr. | UNINA-9910778085203321 |
Mehan Julie E | ||
Ely, : IT Governance Pub., 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush |
Autore | Mehan Julie E |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (601 p.) |
Disciplina | 005.74 |
Altri autori (Persone) | KrushWaylon |
Soggetto topico |
Computer security
Computer networks - Certification Information technology - Security measures Information technology - Certification Data protection |
Soggetto genere / forma | Electronic books. |
ISBN |
1-84928-129-7
1-282-52904-8 9786612529047 1-84928-007-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS - ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES - THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION - PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE - CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN - MAINTAINING AUTHORIZATION
CHAPTER 9: REMOVE THE INFORMATION SYSTEM FROM OPERATIONCHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE; CHAPTER 11: C&A IN THE US DEPARTMENT OF DEFENSE; CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT; CHAPTER 13: THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA); CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC); CHAPTER 15: INFORMATION SYSTEMS SECURITY TRAINING AND CERTIFICATION; CHAPTER 16: THE FUTURE - REVITALIZING AND TRANSFORMING C&A; THE RESOURCE CD; GLOSSARY; ACRONYMS |
Altri titoli varianti | Definitive guide to the certification and accreditation transformation |
Record Nr. | UNINA-9910460107803321 |
Mehan Julie E | ||
Ely, U.K., : IT Governance Pub., 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The definitive guide to the C&A transformation [[electronic resource] ] : the first publication of a comprehensive view of the C&A transformation / / Julie E. Mehan, Waylon Krush |
Autore | Mehan Julie E |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (601 p.) |
Disciplina | 005.74 |
Altri autori (Persone) | KrushWaylon |
Soggetto topico |
Computer security
Computer networks - Certification Information technology - Security measures Information technology - Certification Data protection |
ISBN |
1-84928-129-7
1-282-52904-8 9786612529047 1-84928-007-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS - ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES - THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION - PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE - CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN - MAINTAINING AUTHORIZATION
CHAPTER 9: REMOVE THE INFORMATION SYSTEM FROM OPERATIONCHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE; CHAPTER 11: C&A IN THE US DEPARTMENT OF DEFENSE; CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT; CHAPTER 13: THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA); CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC); CHAPTER 15: INFORMATION SYSTEMS SECURITY TRAINING AND CERTIFICATION; CHAPTER 16: THE FUTURE - REVITALIZING AND TRANSFORMING C&A; THE RESOURCE CD; GLOSSARY; ACRONYMS |
Altri titoli varianti | Definitive guide to the certification and accreditation transformation |
Record Nr. | UNINA-9910785672503321 |
Mehan Julie E | ||
Ely, U.K., : IT Governance Pub., 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|