FISMA compliance handbook:
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
© 2013
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws are cited and discussed, including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a compliance project. The following section of the book shows how to address security awareness, end-user rules of behavior, and in |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (1 volume) illustrations |
ISBN: | 9780124059153 0124059155 012405871X 9780124058712 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126168 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124059153 |9 978-0-12-405915-3 | ||
020 | |a 0124059155 |9 0-12-405915-5 | ||
020 | |a 012405871X |9 0-12-405871-X | ||
020 | |a 9780124058712 |9 978-0-12-405871-2 | ||
035 | |a (ZDB-33-ESD)ocn865512053 | ||
035 | |a (OCoLC)865512053 | ||
035 | |a (DE-599)BVBBV046126168 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Taylor, Laura P. |e Verfasser |4 aut | |
245 | 1 | 0 | |a FISMA compliance handbook |c Laura P. Taylor |
246 | 1 | 3 | |a Federal Information Security Management Act of 2002 compliance handbook |
246 | 1 | 3 | |a Federal Information Security Management Act of 2002 |
250 | |a 2nd ed | ||
264 | 1 | |a Waltham, MA |b Syngress |c © 2013 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws are cited and discussed, including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a compliance project. The following section of the book shows how to address security awareness, end-user rules of behavior, and in | ||
610 | 1 | 7 | |a United States / Federal Information Security Management Act of 2002 |2 blmlsh |
610 | 2 | 4 | |a United States |t Federal Information Security Management Act of 2002 |
650 | 7 | |a Federal Information Security Management Act of 2002 (United States) |2 fast | |
650 | 7 | |a LAW / Constitutional |2 bisacsh | |
650 | 7 | |a LAW / Public |2 bisacsh | |
650 | 7 | |a Computer security / Law and legislation |2 fast | |
650 | 7 | |a Data protection / Law and legislation |2 fast | |
650 | 4 | |a Electronic government information |x Security measures |z United States | |
650 | 4 | |a Computer security |x Law and legislation |z United States | |
650 | 4 | |a Data protection |x Law and legislation |z United States | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124058712 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124058712 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506621 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124058712 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180445984718848 |
---|---|
any_adam_object | |
author | Taylor, Laura P. |
author_facet | Taylor, Laura P. |
author_role | aut |
author_sort | Taylor, Laura P. |
author_variant | l p t lp lpt |
building | Verbundindex |
bvnumber | BV046126168 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn865512053 (OCoLC)865512053 (DE-599)BVBBV046126168 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02785nmm a2200529zc 4500</leader><controlfield tag="001">BV046126168</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124059153</subfield><subfield code="9">978-0-12-405915-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124059155</subfield><subfield code="9">0-12-405915-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012405871X</subfield><subfield code="9">0-12-405871-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124058712</subfield><subfield code="9">978-0-12-405871-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn865512053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)865512053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126168</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Taylor, Laura P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">FISMA compliance handbook</subfield><subfield code="c">Laura P. Taylor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Federal Information Security Management Act of 2002 compliance handbook</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Federal Information Security Management Act of 2002</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws are cited and discussed, including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a compliance project. The following section of the book shows how to address security awareness, end-user rules of behavior, and in</subfield></datafield><datafield tag="610" ind1="1" ind2="7"><subfield code="a">United States / Federal Information Security Management Act of 2002</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="t">Federal Information Security Management Act of 2002</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Federal Information Security Management Act of 2002 (United States)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Constitutional</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Public</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic government information</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124058712</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124058712</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506621</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124058712</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126168 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:53Z |
institution | BVB |
isbn | 9780124059153 0124059155 012405871X 9780124058712 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506621 |
oclc_num | 865512053 |
open_access_boolean | |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress |
record_format | marc |
spelling | Taylor, Laura P. Verfasser aut FISMA compliance handbook Laura P. Taylor Federal Information Security Management Act of 2002 compliance handbook Federal Information Security Management Act of 2002 2nd ed Waltham, MA Syngress © 2013 1 online resource (1 volume) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws are cited and discussed, including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a compliance project. The following section of the book shows how to address security awareness, end-user rules of behavior, and in United States / Federal Information Security Management Act of 2002 blmlsh United States Federal Information Security Management Act of 2002 Federal Information Security Management Act of 2002 (United States) fast LAW / Constitutional bisacsh LAW / Public bisacsh Computer security / Law and legislation fast Data protection / Law and legislation fast Electronic government information Security measures United States Computer security Law and legislation United States Data protection Law and legislation United States Erscheint auch als Druck-Ausgabe 9780124058712 http://www.sciencedirect.com/science/book/9780124058712 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Taylor, Laura P. FISMA compliance handbook United States / Federal Information Security Management Act of 2002 blmlsh United States Federal Information Security Management Act of 2002 Federal Information Security Management Act of 2002 (United States) fast LAW / Constitutional bisacsh LAW / Public bisacsh Computer security / Law and legislation fast Data protection / Law and legislation fast Electronic government information Security measures United States Computer security Law and legislation United States Data protection Law and legislation United States |
title | FISMA compliance handbook |
title_alt | Federal Information Security Management Act of 2002 compliance handbook Federal Information Security Management Act of 2002 |
title_auth | FISMA compliance handbook |
title_exact_search | FISMA compliance handbook |
title_full | FISMA compliance handbook Laura P. Taylor |
title_fullStr | FISMA compliance handbook Laura P. Taylor |
title_full_unstemmed | FISMA compliance handbook Laura P. Taylor |
title_short | FISMA compliance handbook |
title_sort | fisma compliance handbook |
topic | United States / Federal Information Security Management Act of 2002 blmlsh United States Federal Information Security Management Act of 2002 Federal Information Security Management Act of 2002 (United States) fast LAW / Constitutional bisacsh LAW / Public bisacsh Computer security / Law and legislation fast Data protection / Law and legislation fast Electronic government information Security measures United States Computer security Law and legislation United States Data protection Law and legislation United States |
topic_facet | United States / Federal Information Security Management Act of 2002 United States Federal Information Security Management Act of 2002 Federal Information Security Management Act of 2002 (United States) LAW / Constitutional LAW / Public Computer security / Law and legislation Data protection / Law and legislation Electronic government information Security measures United States Computer security Law and legislation United States Data protection Law and legislation United States |
url | http://www.sciencedirect.com/science/book/9780124058712 |
work_keys_str_mv | AT taylorlaurap fismacompliancehandbook AT taylorlaurap federalinformationsecuritymanagementactof2002compliancehandbook AT taylorlaurap federalinformationsecuritymanagementactof2002 |