Security assessment :: case studies for implementing the NSA IAM /
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress,
2004.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxxiv, 429 pages) : illustrations |
ISBN: | 1597490105 9781597490108 9781932266962 1932266968 0080480829 9780080480824 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm56978955 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 041116s2004 maua o 001 1 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d NTG |d EBLCP |d OPELS |d YDXCP |d IDEBK |d MHW |d MERUC |d NLE |d UKDOC |d ZCU |d DEBSZ |d OCLCQ |d MUX |d OCLCQ |d AGLDB |d PIFBR |d X#7 |d OCLCQ |d WY@ |d OCLCA |d LUE |d D6H |d VTS |d ICG |d TOF |d OCLCQ |d WYU |d STF |d G3B |d LEAUB |d DKC |d OCLCQ |d OL$ |d COM |d OCLCO |d OCL |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 60743533 |a 85836282 |a 162599394 |a 181842158 |a 191035009 |a 507525105 |a 991946628 | ||
020 | |a 1597490105 |q (electronic bk.) | ||
020 | |a 9781597490108 |q (electronic bk.) | ||
020 | |a 9781932266962 | ||
020 | |a 1932266968 | ||
020 | |a 0080480829 | ||
020 | |a 9780080480824 | ||
035 | |a (OCoLC)56978955 |z (OCoLC)60743533 |z (OCoLC)85836282 |z (OCoLC)162599394 |z (OCoLC)181842158 |z (OCoLC)191035009 |z (OCoLC)507525105 |z (OCoLC)991946628 | ||
050 | 4 | |a QA76.9.A25 |b S38 2004eb | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Security assessment : |b case studies for implementing the NSA IAM / |c Russ Rogers [and others]. |
260 | |a Rockland, Mass. : |b Syngress, |c 2004. | ||
300 | |a 1 online resource (xxxiv, 429 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends. | |
520 | |a The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more. | ||
650 | 0 | |a Computer security |x Evaluation. | |
650 | 6 | |a Sécurité informatique |x Évaluation. | |
650 | 7 | |a Computer security |x Evaluation |2 fast | |
655 | 0 | |a Electronic books. | |
655 | 2 | |a Fictional Work |0 https://id.nlm.nih.gov/mesh/D022922 | |
655 | 7 | |a Fiction |2 fast | |
655 | 7 | |a Fiction. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026339 | |
655 | 7 | |a Romans. |2 rvmgf | |
700 | 1 | |a Rogers, Russ. |0 http://id.loc.gov/authorities/names/no2004020328 | |
710 | 2 | |a Syngress Media, Inc. |0 http://id.loc.gov/authorities/names/n98062058 | |
758 | |i has work: |a Security assessment (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFrdGKbYJCwYXjgm89rC33 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Security assessment. |d Rockland, Mass. : Syngress, 2004 |z 1932266968 |w (OCoLC)53709726 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781932266962 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=122028 |3 Volltext |
938 | |a 123Library |b 123L |n 36347 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL175469 | ||
938 | |a EBSCOhost |b EBSC |n 122028 | ||
938 | |a YBP Library Services |b YANK |n 2613362 | ||
938 | |a YBP Library Services |b YANK |n 2360388 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm56978955 |
---|---|
_version_ | 1816881621439086593 |
adam_text | |
any_adam_object | |
author2 | Rogers, Russ |
author2_role | |
author2_variant | r r rr |
author_GND | http://id.loc.gov/authorities/names/no2004020328 |
author_corporate | Syngress Media, Inc |
author_corporate_role | |
author_facet | Rogers, Russ Syngress Media, Inc |
author_sort | Rogers, Russ |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S38 2004eb |
callnumber-search | QA76.9.A25 S38 2004eb |
callnumber-sort | QA 276.9 A25 S38 42004EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends. |
ctrlnum | (OCoLC)56978955 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04593cam a2200601 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm56978955 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">041116s2004 maua o 001 1 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">NTG</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OPELS</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">MHW</subfield><subfield code="d">MERUC</subfield><subfield code="d">NLE</subfield><subfield code="d">UKDOC</subfield><subfield code="d">ZCU</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MUX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PIFBR</subfield><subfield code="d">X#7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">G3B</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OL$</subfield><subfield code="d">COM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">60743533</subfield><subfield code="a">85836282</subfield><subfield code="a">162599394</subfield><subfield code="a">181842158</subfield><subfield code="a">191035009</subfield><subfield code="a">507525105</subfield><subfield code="a">991946628</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490105</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490108</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266962</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266968</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080480829</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080480824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56978955</subfield><subfield code="z">(OCoLC)60743533</subfield><subfield code="z">(OCoLC)85836282</subfield><subfield code="z">(OCoLC)162599394</subfield><subfield code="z">(OCoLC)181842158</subfield><subfield code="z">(OCoLC)191035009</subfield><subfield code="z">(OCoLC)507525105</subfield><subfield code="z">(OCoLC)991946628</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S38 2004eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Security assessment :</subfield><subfield code="b">case studies for implementing the NSA IAM /</subfield><subfield code="c">Russ Rogers [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxiv, 429 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Evaluation.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Évaluation.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Evaluation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="0"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Fictional Work</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D022922</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Fiction</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Fiction.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026339</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Romans.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004020328</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Syngress Media, Inc.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98062058</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security assessment (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFrdGKbYJCwYXjgm89rC33</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Security assessment.</subfield><subfield code="d">Rockland, Mass. : Syngress, 2004</subfield><subfield code="z">1932266968</subfield><subfield code="w">(OCoLC)53709726</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781932266962</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=122028</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">36347</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL175469</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">122028</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613362</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2360388</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. Fictional Work https://id.nlm.nih.gov/mesh/D022922 Fiction fast Fiction. lcgft http://id.loc.gov/authorities/genreForms/gf2014026339 Romans. rvmgf |
genre_facet | Electronic books. Fictional Work Fiction Fiction. Romans. |
id | ZDB-4-EBA-ocm56978955 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:38Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n98062058 |
isbn | 1597490105 9781597490108 9781932266962 1932266968 0080480829 9780080480824 |
language | English |
oclc_num | 56978955 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxxiv, 429 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress, |
record_format | marc |
spelling | Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others]. Rockland, Mass. : Syngress, 2004. 1 online resource (xxxiv, 429 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes index. Print version record. Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends. The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more. Computer security Evaluation. Sécurité informatique Évaluation. Computer security Evaluation fast Electronic books. Fictional Work https://id.nlm.nih.gov/mesh/D022922 Fiction fast Fiction. lcgft http://id.loc.gov/authorities/genreForms/gf2014026339 Romans. rvmgf Rogers, Russ. http://id.loc.gov/authorities/names/no2004020328 Syngress Media, Inc. http://id.loc.gov/authorities/names/n98062058 has work: Security assessment (Text) https://id.oclc.org/worldcat/entity/E39PCFrdGKbYJCwYXjgm89rC33 https://id.oclc.org/worldcat/ontology/hasWork Print version: Security assessment. Rockland, Mass. : Syngress, 2004 1932266968 (OCoLC)53709726 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781932266962 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=122028 Volltext |
spellingShingle | Security assessment : case studies for implementing the NSA IAM / Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends. Computer security Evaluation. Sécurité informatique Évaluation. Computer security Evaluation fast |
subject_GND | https://id.nlm.nih.gov/mesh/D022922 http://id.loc.gov/authorities/genreForms/gf2014026339 |
title | Security assessment : case studies for implementing the NSA IAM / |
title_auth | Security assessment : case studies for implementing the NSA IAM / |
title_exact_search | Security assessment : case studies for implementing the NSA IAM / |
title_full | Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others]. |
title_fullStr | Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others]. |
title_full_unstemmed | Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others]. |
title_short | Security assessment : |
title_sort | security assessment case studies for implementing the nsa iam |
title_sub | case studies for implementing the NSA IAM / |
topic | Computer security Evaluation. Sécurité informatique Évaluation. Computer security Evaluation fast |
topic_facet | Computer security Evaluation. Sécurité informatique Évaluation. Computer security Evaluation Electronic books. Fictional Work Fiction Fiction. Romans. |
url | https://www.sciencedirect.com/science/book/9781932266962 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=122028 |
work_keys_str_mv | AT rogersruss securityassessmentcasestudiesforimplementingthensaiam AT syngressmediainc securityassessmentcasestudiesforimplementingthensaiam |