FISMA and the risk management framework: the new practice of federal cyber security
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston
Syngress
2013
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense, Office of the Directory of National Intelligence, Committee for National Security Systems and the National Institute of Standards and Technology. Based on the new FISMA requirements for 2011 and beyond, this book catalogs the processes, procedures and specific security recommendations underlying the new Risk Management Framework. Written by an experienced FISMA practitioner, this book presents an effective system of information assurance, real-time risk monitoring and secure configurations for common operating systems. Learn how to build a robust, near real-time risk management system and comply with FISMADiscover the changes to FISMA compliance and beyondGain your systems the authorization they need Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597496414 1597496413 9781597496421 1597496421 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305251 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781597496414 |9 978-1-59749-641-4 | ||
020 | |a 1597496413 |9 1-59749-641-3 | ||
020 | |a 9781597496421 |c electronic bk. |9 978-1-59749-642-1 | ||
020 | |a 1597496421 |c electronic bk. |9 1-59749-642-1 | ||
035 | |a (ZDB-33-EBS)ocn819506980 | ||
035 | |a (OCoLC)819506980 | ||
035 | |a (DE-599)BVBBV042305251 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a FISMA and the risk management framework |b the new practice of federal cyber security |c [edited by] Stephen D. Gantz, Daniel R. Philpott |
264 | 1 | |a Boston |b Syngress |c 2013 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense, Office of the Directory of National Intelligence, Committee for National Security Systems and the National Institute of Standards and Technology. Based on the new FISMA requirements for 2011 and beyond, this book catalogs the processes, procedures and specific security recommendations underlying the new Risk Management Framework. Written by an experienced FISMA practitioner, this book presents an effective system of information assurance, real-time risk monitoring and secure configurations for common operating systems. Learn how to build a robust, near real-time risk management system and comply with FISMADiscover the changes to FISMA compliance and beyondGain your systems the authorization they need | ||
500 | |a Includes bibliographical references and index | ||
610 | 1 | 7 | |a United States / Federal Information Security Management Act of 2002 |2 blmlsh |
610 | 2 | 4 | |a United States |t Federal Information Security Management Act of 2002 |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security / United States |2 local | |
650 | 7 | |a Computer security / Law and legislation / United States |2 local | |
650 | 7 | |a Information technology / Security measures / United States |2 local | |
650 | 7 | |a Electronic government information / Security measures / United States |2 local | |
650 | 7 | |a Administrative agencies / Information resources management / Security measures / United States |2 local | |
650 | 7 | |a Computer networks / Security measures / United States |2 local | |
650 | 4 | |a Recht | |
650 | 4 | |a Computer security |z United States | |
650 | 4 | |a Computer security |x Law and legislation |z United States | |
650 | 4 | |a Information technology |x Security measures |z United States | |
650 | 4 | |a Electronic government information |x Security measures |z United States | |
650 | 4 | |a Administrative agencies |x Information resources management |x Security measures |z United States | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
651 | 4 | |a USA | |
653 | |a Electronic books | ||
700 | 1 | |a Gantz, Stephen D. |e Sonstige |4 oth | |
700 | 1 | |a Philpott, Daniel R. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496414 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742243 |
Datensatz im Suchindex
_version_ | 1804152888141807616 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042305251 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn819506980 (OCoLC)819506980 (DE-599)BVBBV042305251 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03782nmm a2200637zc 4500</leader><controlfield tag="001">BV042305251</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496414</subfield><subfield code="9">978-1-59749-641-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496413</subfield><subfield code="9">1-59749-641-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496421</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-642-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496421</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-642-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn819506980</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)819506980</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305251</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">FISMA and the risk management framework</subfield><subfield code="b">the new practice of federal cyber security</subfield><subfield code="c">[edited by] Stephen D. Gantz, Daniel R. Philpott</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Syngress</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense, Office of the Directory of National Intelligence, Committee for National Security Systems and the National Institute of Standards and Technology. Based on the new FISMA requirements for 2011 and beyond, this book catalogs the processes, procedures and specific security recommendations underlying the new Risk Management Framework. Written by an experienced FISMA practitioner, this book presents an effective system of information assurance, real-time risk monitoring and secure configurations for common operating systems. Learn how to build a robust, near real-time risk management system and comply with FISMADiscover the changes to FISMA compliance and beyondGain your systems the authorization they need</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="610" ind1="1" ind2="7"><subfield code="a">United States / Federal Information Security Management Act of 2002</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="t">Federal Information Security Management Act of 2002</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Law and legislation / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic government information / Security measures / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Administrative agencies / Information resources management / Security measures / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic government information</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Administrative agencies</subfield><subfield code="x">Information resources management</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gantz, Stephen D.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Philpott, Daniel R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496414</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742243</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV042305251 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9781597496414 1597496413 9781597496421 1597496421 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742243 |
oclc_num | 819506980 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress |
record_format | marc |
spelling | FISMA and the risk management framework the new practice of federal cyber security [edited by] Stephen D. Gantz, Daniel R. Philpott Boston Syngress 2013 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense, Office of the Directory of National Intelligence, Committee for National Security Systems and the National Institute of Standards and Technology. Based on the new FISMA requirements for 2011 and beyond, this book catalogs the processes, procedures and specific security recommendations underlying the new Risk Management Framework. Written by an experienced FISMA practitioner, this book presents an effective system of information assurance, real-time risk monitoring and secure configurations for common operating systems. Learn how to build a robust, near real-time risk management system and comply with FISMADiscover the changes to FISMA compliance and beyondGain your systems the authorization they need Includes bibliographical references and index United States / Federal Information Security Management Act of 2002 blmlsh United States Federal Information Security Management Act of 2002 COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / United States local Computer security / Law and legislation / United States local Information technology / Security measures / United States local Electronic government information / Security measures / United States local Administrative agencies / Information resources management / Security measures / United States local Computer networks / Security measures / United States local Recht Computer security United States Computer security Law and legislation United States Information technology Security measures United States Electronic government information Security measures United States Administrative agencies Information resources management Security measures United States Computer networks Security measures United States USA Electronic books Gantz, Stephen D. Sonstige oth Philpott, Daniel R. Sonstige oth http://www.sciencedirect.com/science/book/9781597496414 Verlag Volltext |
spellingShingle | FISMA and the risk management framework the new practice of federal cyber security United States / Federal Information Security Management Act of 2002 blmlsh United States Federal Information Security Management Act of 2002 COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / United States local Computer security / Law and legislation / United States local Information technology / Security measures / United States local Electronic government information / Security measures / United States local Administrative agencies / Information resources management / Security measures / United States local Computer networks / Security measures / United States local Recht Computer security United States Computer security Law and legislation United States Information technology Security measures United States Electronic government information Security measures United States Administrative agencies Information resources management Security measures United States Computer networks Security measures United States |
title | FISMA and the risk management framework the new practice of federal cyber security |
title_auth | FISMA and the risk management framework the new practice of federal cyber security |
title_exact_search | FISMA and the risk management framework the new practice of federal cyber security |
title_full | FISMA and the risk management framework the new practice of federal cyber security [edited by] Stephen D. Gantz, Daniel R. Philpott |
title_fullStr | FISMA and the risk management framework the new practice of federal cyber security [edited by] Stephen D. Gantz, Daniel R. Philpott |
title_full_unstemmed | FISMA and the risk management framework the new practice of federal cyber security [edited by] Stephen D. Gantz, Daniel R. Philpott |
title_short | FISMA and the risk management framework |
title_sort | fisma and the risk management framework the new practice of federal cyber security |
title_sub | the new practice of federal cyber security |
topic | United States / Federal Information Security Management Act of 2002 blmlsh United States Federal Information Security Management Act of 2002 COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / United States local Computer security / Law and legislation / United States local Information technology / Security measures / United States local Electronic government information / Security measures / United States local Administrative agencies / Information resources management / Security measures / United States local Computer networks / Security measures / United States local Recht Computer security United States Computer security Law and legislation United States Information technology Security measures United States Electronic government information Security measures United States Administrative agencies Information resources management Security measures United States Computer networks Security measures United States |
topic_facet | United States / Federal Information Security Management Act of 2002 United States Federal Information Security Management Act of 2002 COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security / United States Computer security / Law and legislation / United States Information technology / Security measures / United States Electronic government information / Security measures / United States Administrative agencies / Information resources management / Security measures / United States Computer networks / Security measures / United States Recht Computer security United States Computer security Law and legislation United States Information technology Security measures United States Electronic government information Security measures United States Administrative agencies Information resources management Security measures United States Computer networks Security measures United States USA |
url | http://www.sciencedirect.com/science/book/9781597496414 |
work_keys_str_mv | AT gantzstephend fismaandtheriskmanagementframeworkthenewpracticeoffederalcybersecurity AT philpottdanielr fismaandtheriskmanagementframeworkthenewpracticeoffederalcybersecurity |