|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn700919041 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
110207s2009 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d MHW
|d OCLCQ
|d IDEBK
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d ZCU
|d OCLCQ
|d MERUC
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781849280075
|
020 |
|
|
|a 184928007X
|
029 |
1 |
|
|a DEBBG
|b BV044144902
|
029 |
1 |
|
|a DEBSZ
|b 396399053
|
035 |
|
|
|a (OCoLC)700919041
|
050 |
|
4 |
|a QA76.9.D53
|
082 |
0 |
4 |
|a 005.74
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mehan, Julie E.
|
245 |
1 |
4 |
|a The Definitive Guide to the C & A Transformation Process.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2009.
|
300 |
|
|
|a 1 online resource (601 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a 'The Definitive Guide to the C & A Transformation' is the first comprehensive manual that sets out to explain the current standards and best practices. The book provides all the information needed to recognize, implement and manage the relevant authorization requirements, and therefore to achieve compliance with federal, local and agency laws and policies. Each chapter not only provides a list of related references but also offers recommendations for additional reading.
|
505 |
0 |
|
|a INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS -- ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES -- THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION -- PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE -- CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN -- MAINTAINING AUTHORIZATION.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Certification.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Certification.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Computer networks
|x Certification
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
700 |
1 |
|
|a Krush, Waylon.
|
776 |
0 |
8 |
|i Print version:
|a Mehan, Julie E.
|t Definitive Guide to the C & A Transformation Process.
|d Ely : IT Governance Publishing, ©2009
|z 9781849280068
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=547041
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL547041
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 252904
|
994 |
|
|
|a 92
|b IZTAP
|