FISMA certification & accreditation handbook:
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be ci...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress
2007
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597491167/?ar |
Zusammenfassung: | The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxx, 498 Seiten) illustrations |
ISBN: | 9781597491167 1597491160 9781429454926 142945492X 0080506534 9780080506531 1282552473 9781282552470 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647086 | ||
003 | DE-627-1 | ||
005 | 20240228114137.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9781597491167 |9 978-1-59749-116-7 | ||
020 | |a 1597491160 |9 1-59749-116-0 | ||
020 | |a 9781429454926 |c electronic bk. |9 978-1-4294-5492-6 | ||
020 | |a 142945492X |c electronic bk. |9 1-4294-5492-X | ||
020 | |a 0080506534 |9 0-08-050653-4 | ||
020 | |a 9780080506531 |c electronic bk. |9 978-0-08-050653-1 | ||
020 | |a 1282552473 |9 1-282-55247-3 | ||
020 | |a 9781282552470 |9 978-1-282-55247-0 | ||
035 | |a (DE-627-1)047647086 | ||
035 | |a (DE-599)KEP047647086 | ||
035 | |a (ORHE)9781597491167 | ||
035 | |a (DE-627-1)047647086 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a KM |2 bicssc | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Taylor, Laura |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a FISMA certification & accreditation handbook |c Laura Taylor ; Matthew Shepherd, technical editor |
264 | 1 | |a Rockland, MA |b Syngress |c 2007 | |
300 | |a 1 Online-Ressource (xxx, 498 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Data protection | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
700 | 1 | |a Shepherd, Matthew |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597491160 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597491160 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597491167/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647086 |
---|---|
_version_ | 1821494867650412544 |
adam_text | |
any_adam_object | |
author | Taylor, Laura |
author2 | Shepherd, Matthew |
author2_role | ctb |
author2_variant | m s ms |
author_facet | Taylor, Laura Shepherd, Matthew |
author_role | aut |
author_sort | Taylor, Laura |
author_variant | l t lt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647086 (DE-599)KEP047647086 (ORHE)9781597491167 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03411cam a22006132 4500</leader><controlfield tag="001">ZDB-30-ORH-047647086</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114137.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491167</subfield><subfield code="9">978-1-59749-116-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491160</subfield><subfield code="9">1-59749-116-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429454926</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-5492-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">142945492X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-5492-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080506534</subfield><subfield code="9">0-08-050653-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080506531</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050653-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282552473</subfield><subfield code="9">1-282-55247-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282552470</subfield><subfield code="9">978-1-282-55247-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647086</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647086</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597491167</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647086</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">KM</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Taylor, Laura</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">FISMA certification & accreditation handbook</subfield><subfield code="c">Laura Taylor ; Matthew Shepherd, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 498 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shepherd, Matthew</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597491160</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597491160</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597491167/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647086 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597491167 1597491160 9781429454926 142945492X 0080506534 9780080506531 1282552473 9781282552470 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxx, 498 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | Taylor, Laura VerfasserIn aut FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor Rockland, MA Syngress 2007 1 Online-Ressource (xxx, 498 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers. Computer security Data protection Sécurité informatique Protection de l'information (Informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Shepherd, Matthew MitwirkendeR ctb 1597491160 Erscheint auch als Druck-Ausgabe 1597491160 |
spellingShingle | Taylor, Laura FISMA certification & accreditation handbook Computer security Data protection Sécurité informatique Protection de l'information (Informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
title | FISMA certification & accreditation handbook |
title_auth | FISMA certification & accreditation handbook |
title_exact_search | FISMA certification & accreditation handbook |
title_full | FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor |
title_fullStr | FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor |
title_full_unstemmed | FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor |
title_short | FISMA certification & accreditation handbook |
title_sort | fisma certification accreditation handbook |
topic | Computer security Data protection Sécurité informatique Protection de l'information (Informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
topic_facet | Computer security Data protection Sécurité informatique Protection de l'information (Informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
work_keys_str_mv | AT taylorlaura fismacertificationaccreditationhandbook AT shepherdmatthew fismacertificationaccreditationhandbook |