The definitive guide to the C & A transformation: the first publication of a comprehensive view Of the C & A transformation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, U.K.
IT Governance Pub.
2009
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen Includes bibliographical references and link to CD content Introduction -- - Chap. 1 - An abridged history of information technology and information systems security -- - Chap. 2 - The essential information systems security regulations -- - Chap. 3 - The authorizaation process framework -- - Chap. 4. The authorization process - Establishing a foundation -- - Chap. 5 - Pre-authorization activities - The fundamentals -- - Chap. 6 - Plan, initiate and implement authorization - preparing for authorization -- - Chap. 7 - Verfy, validate & authorize - conducting the authorization -- - Chap. 8 - Operate & maintain - maintaining authorization -- - Chap. 9 - Remove the infromation system from operation 309 -- - Chap. 10 - Authorization package and supporting evidence -- - Chap. 11 - C&A in the US department of defense -- - Chap. 12 - Authorization in the Federal government -- - Chap. 13 - The federal information security management act (FISMA) -- - Chap. 14 - Authorization and the system life cycle (SLC) -- - Chap. 15 - Information systems security training and certification -- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 1849280061 184928007X 9781849280068 9781849280075 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043064556 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 1849280061 |9 1-84928-006-1 | ||
020 | |a 184928007X |c electronic bk. |9 1-84928-007-X | ||
020 | |a 9781849280068 |9 978-1-84928-006-8 | ||
020 | |a 9781849280075 |c electronic bk. |9 978-1-84928-007-5 | ||
035 | |a (OCoLC)688637914 | ||
035 | |a (DE-599)BVBBV043064556 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Mehan, Julie E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The definitive guide to the C & A transformation |b the first publication of a comprehensive view Of the C & A transformation |c Julie E. Mehan, Waylon Krush |
264 | 1 | |a Ely, U.K. |b IT Governance Pub. |c 2009 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen | ||
500 | |a Includes bibliographical references and link to CD content | ||
500 | |a Introduction -- - Chap. 1 - An abridged history of information technology and information systems security -- - Chap. 2 - The essential information systems security regulations -- - Chap. 3 - The authorizaation process framework -- - Chap. 4. The authorization process - Establishing a foundation -- - Chap. 5 - Pre-authorization activities - The fundamentals -- - Chap. 6 - Plan, initiate and implement authorization - preparing for authorization -- - Chap. 7 - Verfy, validate & authorize - conducting the authorization -- - Chap. 8 - Operate & maintain - maintaining authorization -- - Chap. 9 - Remove the infromation system from operation 309 -- - Chap. 10 - Authorization package and supporting evidence -- - Chap. 11 - C&A in the US department of defense -- - Chap. 12 - Authorization in the Federal government -- - Chap. 13 - The federal information security management act (FISMA) -- - Chap. 14 - Authorization and the system life cycle (SLC) -- - Chap. 15 - Information systems security training and certification -- | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security / United States / Management |2 local | |
650 | 7 | |a Information technology / Security measures / United States |2 local | |
650 | 7 | |a Computer networks / Certification / United States |2 local | |
650 | 7 | |a Computer networks / Accreditation / United States |2 local | |
650 | 7 | |a Cyberinfrastructure / United States |2 local | |
650 | 4 | |a Computer security |z United States |x Management | |
650 | 4 | |a Information technology |x Security measures |z United States | |
650 | 4 | |a Computer networks |x Certification |z United States | |
650 | 4 | |a Computer networks |x Accreditation |z United States | |
650 | 4 | |a Cyberinfrastructure |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Krush, Waylon |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028488748 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175442386616320 |
---|---|
any_adam_object | |
author | Mehan, Julie E. |
author_facet | Mehan, Julie E. |
author_role | aut |
author_sort | Mehan, Julie E. |
author_variant | j e m je jem |
building | Verbundindex |
bvnumber | BV043064556 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)688637914 (DE-599)BVBBV043064556 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03567nmm a2200565zc 4500</leader><controlfield tag="001">BV043064556</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280061</subfield><subfield code="9">1-84928-006-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">184928007X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-007-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280068</subfield><subfield code="9">978-1-84928-006-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280075</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-007-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)688637914</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043064556</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mehan, Julie E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The definitive guide to the C & A transformation</subfield><subfield code="b">the first publication of a comprehensive view Of the C & A transformation</subfield><subfield code="c">Julie E. Mehan, Waylon Krush</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, U.K.</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and link to CD content</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- - Chap. 1 - An abridged history of information technology and information systems security -- - Chap. 2 - The essential information systems security regulations -- - Chap. 3 - The authorizaation process framework -- - Chap. 4. The authorization process - Establishing a foundation -- - Chap. 5 - Pre-authorization activities - The fundamentals -- - Chap. 6 - Plan, initiate and implement authorization - preparing for authorization -- - Chap. 7 - Verfy, validate & authorize - conducting the authorization -- - Chap. 8 - Operate & maintain - maintaining authorization -- - Chap. 9 - Remove the infromation system from operation 309 -- - Chap. 10 - Authorization package and supporting evidence -- - Chap. 11 - C&A in the US department of defense -- - Chap. 12 - Authorization in the Federal government -- - Chap. 13 - The federal information security management act (FISMA) -- - Chap. 14 - Authorization and the system life cycle (SLC) -- - Chap. 15 - Information systems security training and certification --</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / United States / Management</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Certification / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Accreditation / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberinfrastructure / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Certification</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Accreditation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberinfrastructure</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krush, Waylon</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028488748</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043064556 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:21Z |
institution | BVB |
isbn | 1849280061 184928007X 9781849280068 9781849280075 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028488748 |
oclc_num | 688637914 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Mehan, Julie E. Verfasser aut The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation Julie E. Mehan, Waylon Krush Ely, U.K. IT Governance Pub. 2009 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Title from title screen Includes bibliographical references and link to CD content Introduction -- - Chap. 1 - An abridged history of information technology and information systems security -- - Chap. 2 - The essential information systems security regulations -- - Chap. 3 - The authorizaation process framework -- - Chap. 4. The authorization process - Establishing a foundation -- - Chap. 5 - Pre-authorization activities - The fundamentals -- - Chap. 6 - Plan, initiate and implement authorization - preparing for authorization -- - Chap. 7 - Verfy, validate & authorize - conducting the authorization -- - Chap. 8 - Operate & maintain - maintaining authorization -- - Chap. 9 - Remove the infromation system from operation 309 -- - Chap. 10 - Authorization package and supporting evidence -- - Chap. 11 - C&A in the US department of defense -- - Chap. 12 - Authorization in the Federal government -- - Chap. 13 - The federal information security management act (FISMA) -- - Chap. 14 - Authorization and the system life cycle (SLC) -- - Chap. 15 - Information systems security training and certification -- COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / United States / Management local Information technology / Security measures / United States local Computer networks / Certification / United States local Computer networks / Accreditation / United States local Cyberinfrastructure / United States local Computer security United States Management Information technology Security measures United States Computer networks Certification United States Computer networks Accreditation United States Cyberinfrastructure United States USA Krush, Waylon Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114 Aggregator Volltext |
spellingShingle | Mehan, Julie E. The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / United States / Management local Information technology / Security measures / United States local Computer networks / Certification / United States local Computer networks / Accreditation / United States local Cyberinfrastructure / United States local Computer security United States Management Information technology Security measures United States Computer networks Certification United States Computer networks Accreditation United States Cyberinfrastructure United States |
title | The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation |
title_auth | The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation |
title_exact_search | The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation |
title_full | The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation Julie E. Mehan, Waylon Krush |
title_fullStr | The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation Julie E. Mehan, Waylon Krush |
title_full_unstemmed | The definitive guide to the C & A transformation the first publication of a comprehensive view Of the C & A transformation Julie E. Mehan, Waylon Krush |
title_short | The definitive guide to the C & A transformation |
title_sort | the definitive guide to the c a transformation the first publication of a comprehensive view of the c a transformation |
title_sub | the first publication of a comprehensive view Of the C & A transformation |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / United States / Management local Information technology / Security measures / United States local Computer networks / Certification / United States local Computer networks / Accreditation / United States local Cyberinfrastructure / United States local Computer security United States Management Information technology Security measures United States Computer networks Certification United States Computer networks Accreditation United States Cyberinfrastructure United States |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security / United States / Management Information technology / Security measures / United States Computer networks / Certification / United States Computer networks / Accreditation / United States Cyberinfrastructure / United States Computer security United States Management Information technology Security measures United States Computer networks Certification United States Computer networks Accreditation United States Cyberinfrastructure United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391114 |
work_keys_str_mv | AT mehanjuliee thedefinitiveguidetothecatransformationthefirstpublicationofacomprehensiveviewofthecatransformation AT krushwaylon thedefinitiveguidetothecatransformationthefirstpublicationofacomprehensiveviewofthecatransformation |