- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Takes a lab-based approach to securing information systems.
Andere Kunden interessierten sich auch für
- Thomas WilhelmNinja Hacking42,99 €
- Tony FlickSecuring the Smart Grid42,99 €
- Pierre-Jean Charrel / Daniel Galarreta (eds.)Project Management and Risk Management in Complex Projects119,99 €
- Jane ChittendenRisk Management56,99 €
- Policies and Research in Identity Management61,99 €
- Alberto PartidaIt Security Management74,99 €
- Walter WilliamsCreating an Information Security Program from Scratch187,99 €
-
-
-
Produktdetails
- Produktdetails
- Verlag: Elsevier Science
- Seitenzahl: 316
- Erscheinungstermin: 22. Juli 2013
- Englisch
- Abmessung: 233mm x 187mm x 20mm
- Gewicht: 491g
- ISBN-13: 9781597499958
- ISBN-10: 1597499951
- Artikelnr.: 37455399
- Verlag: Elsevier Science
- Seitenzahl: 316
- Erscheinungstermin: 22. Juli 2013
- Englisch
- Abmessung: 233mm x 187mm x 20mm
- Gewicht: 491g
- ISBN-13: 9781597499958
- ISBN-10: 1597499951
- Artikelnr.: 37455399
James Broad (CISSP, C EH, CPTS, Security+, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nation's most critical sectors including defense, law enforcement, intelligence, finance and healthcare.
Introduction
Laws, Regulation and Guidance
The Joint Task Force Transformation Initiative
Key Positions and Roles
Transition from the Four-Phase Certification and Accreditation Cycle
The RMF
Integrated Organization-Wide Risk Management
Lab Organization
Phase 1: System Categorization
Phase 2: Control Selection
Phase 3: Control Implementation
Phase 4: Control Assessment
Phase 5: System Authorization
Phase 6: Continuous Monitoring
Use of RMF in Other Environments
Future Planned Changes
Use with Other Compliance Requirements
Appendices
Laws, Regulation and Guidance
The Joint Task Force Transformation Initiative
Key Positions and Roles
Transition from the Four-Phase Certification and Accreditation Cycle
The RMF
Integrated Organization-Wide Risk Management
Lab Organization
Phase 1: System Categorization
Phase 2: Control Selection
Phase 3: Control Implementation
Phase 4: Control Assessment
Phase 5: System Authorization
Phase 6: Continuous Monitoring
Use of RMF in Other Environments
Future Planned Changes
Use with Other Compliance Requirements
Appendices
Introduction
Laws, Regulation and Guidance
The Joint Task Force Transformation Initiative
Key Positions and Roles
Transition from the Four-Phase Certification and Accreditation Cycle
The RMF
Integrated Organization-Wide Risk Management
Lab Organization
Phase 1: System Categorization
Phase 2: Control Selection
Phase 3: Control Implementation
Phase 4: Control Assessment
Phase 5: System Authorization
Phase 6: Continuous Monitoring
Use of RMF in Other Environments
Future Planned Changes
Use with Other Compliance Requirements
Appendices
Laws, Regulation and Guidance
The Joint Task Force Transformation Initiative
Key Positions and Roles
Transition from the Four-Phase Certification and Accreditation Cycle
The RMF
Integrated Organization-Wide Risk Management
Lab Organization
Phase 1: System Categorization
Phase 2: Control Selection
Phase 3: Control Implementation
Phase 4: Control Assessment
Phase 5: System Authorization
Phase 6: Continuous Monitoring
Use of RMF in Other Environments
Future Planned Changes
Use with Other Compliance Requirements
Appendices