Security assessment: case studies for implementing the NSA IAM
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
2004
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more |
Beschreibung: | 1 Online-Ressource (xxxiv, 429 p.) |
ISBN: | 0080480829 1597490105 1932266968 9780080480824 9781597490108 9781932266962 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307370 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2004 |||| o||u| ||||||eng d | ||
020 | |a 0080480829 |9 0-08-048082-9 | ||
020 | |a 1597490105 |c electronic bk. |9 1-59749-010-5 | ||
020 | |a 1932266968 |9 1-932266-96-8 | ||
020 | |a 9780080480824 |9 978-0-08-048082-4 | ||
020 | |a 9781597490108 |c electronic bk. |9 978-1-59749-010-8 | ||
020 | |a 9781932266962 |9 978-1-932266-96-2 | ||
035 | |a (OCoLC)56978955 | ||
035 | |a (DE-599)BVBBV042307370 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Security assessment |b case studies for implementing the NSA IAM |c Russ Rogers ... [et al.] |
264 | 1 | |a Rockland, Mass. |b Syngress |c 2004 | |
300 | |a 1 Online-Ressource (xxxiv, 429 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more | ||
650 | 7 | |a Computer security / Evaluation |2 fast | |
650 | 4 | |a Computer security |x Evaluation | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bewertung |0 (DE-588)4006340-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Bewertung |0 (DE-588)4006340-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Rogers, Russ |e Sonstige |4 oth | |
710 | 2 | |a Syngress Media, Inc |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781932266962 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744362 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781932266962 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893156098048 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042307370 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)56978955 (DE-599)BVBBV042307370 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03307nmm a2200505zc 4500</leader><controlfield tag="001">BV042307370</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080480829</subfield><subfield code="9">0-08-048082-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490105</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-010-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266968</subfield><subfield code="9">1-932266-96-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080480824</subfield><subfield code="9">978-0-08-048082-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490108</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-010-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266962</subfield><subfield code="9">978-1-932266-96-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56978955</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307370</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security assessment</subfield><subfield code="b">case studies for implementing the NSA IAM</subfield><subfield code="c">Russ Rogers ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxiv, 429 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Evaluation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bewertung</subfield><subfield code="0">(DE-588)4006340-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Bewertung</subfield><subfield code="0">(DE-588)4006340-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Syngress Media, Inc</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781932266962</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744362</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781932266962</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307370 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080480829 1597490105 1932266968 9780080480824 9781597490108 9781932266962 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744362 |
oclc_num | 56978955 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxxiv, 429 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress |
record_format | marc |
spelling | Security assessment case studies for implementing the NSA IAM Russ Rogers ... [et al.] Rockland, Mass. Syngress 2004 1 Online-Ressource (xxxiv, 429 p.) txt rdacontent c rdamedia cr rdacarrier Includes index The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more Computer security / Evaluation fast Computer security Evaluation Computersicherheit (DE-588)4274324-2 gnd rswk-swf Bewertung (DE-588)4006340-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Bewertung (DE-588)4006340-9 s 1\p DE-604 Rogers, Russ Sonstige oth Syngress Media, Inc Sonstige oth http://www.sciencedirect.com/science/book/9781932266962 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Security assessment case studies for implementing the NSA IAM Computer security / Evaluation fast Computer security Evaluation Computersicherheit (DE-588)4274324-2 gnd Bewertung (DE-588)4006340-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4006340-9 |
title | Security assessment case studies for implementing the NSA IAM |
title_auth | Security assessment case studies for implementing the NSA IAM |
title_exact_search | Security assessment case studies for implementing the NSA IAM |
title_full | Security assessment case studies for implementing the NSA IAM Russ Rogers ... [et al.] |
title_fullStr | Security assessment case studies for implementing the NSA IAM Russ Rogers ... [et al.] |
title_full_unstemmed | Security assessment case studies for implementing the NSA IAM Russ Rogers ... [et al.] |
title_short | Security assessment |
title_sort | security assessment case studies for implementing the nsa iam |
title_sub | case studies for implementing the NSA IAM |
topic | Computer security / Evaluation fast Computer security Evaluation Computersicherheit (DE-588)4274324-2 gnd Bewertung (DE-588)4006340-9 gnd |
topic_facet | Computer security / Evaluation Computer security Evaluation Computersicherheit Bewertung |
url | http://www.sciencedirect.com/science/book/9781932266962 |
work_keys_str_mv | AT rogersruss securityassessmentcasestudiesforimplementingthensaiam AT syngressmediainc securityassessmentcasestudiesforimplementingthensaiam |