|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
JSTOR_ocn688637914 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
101112s2009 enka ob 000 0 eng d |
040 |
|
|
|a CtWfDGI
|b eng
|e pn
|c STF
|d CEF
|d OCLCQ
|d E7B
|d N$T
|d B24X7
|d OCLCQ
|d DKDLA
|d FCC
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d UMI
|d JSTOR
|d OCLCQ
|d NLGGC
|d OCLCO
|d OCLCQ
|d OCLCO
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d AZK
|d OCLCO
|d JBG
|d COCUF
|d AGLDB
|d MOR
|d PIFAG
|d LIV
|d OCLCQ
|d IOG
|d U3W
|d OCLCA
|d OCLCF
|d EZ9
|d WRM
|d VTS
|d INT
|d VT2
|d OCLCQ
|d WYU
|d LVT
|d OCLCQ
|d STF
|d UAB
|d M8D
|d HS0
|d UKCRE
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 704518473
|a 764548962
|a 768664194
|a 771168842
|a 798259730
|a 798716972
|a 842286161
|a 857301850
|a 961540394
|a 962634514
|a 988497143
|a 992059565
|a 1037937315
|a 1038574885
|a 1055369667
|a 1081284154
|a 1103272811
|a 1129362828
|a 1153024777
|a 1192331134
|a 1228581948
|a 1240525569
|a 1289516967
|a 1302260813
|
020 |
|
|
|a 184928007X
|q (electronic bk.)
|
020 |
|
|
|a 9781849280075
|q (electronic bk.)
|
020 |
|
|
|a 9781849281294
|
020 |
|
|
|a 1849281297
|
020 |
|
|
|z 1849280061
|
020 |
|
|
|z 9781849280068
|
020 |
0 |
|
|a 9781282529045
|q (online)
|
020 |
|
|
|a 1282529048
|
029 |
1 |
|
|a AU@
|b 000050897981
|
029 |
1 |
|
|a AU@
|b 000051561375
|
029 |
1 |
|
|a AU@
|b 000052007832
|
029 |
1 |
|
|a AU@
|b 000059274164
|
029 |
1 |
|
|a DEBBG
|b BV041431792
|
029 |
1 |
|
|a DEBBG
|b BV043064556
|
029 |
1 |
|
|a DEBSZ
|b 372809243
|
029 |
1 |
|
|a DEBSZ
|b 398276595
|
029 |
1 |
|
|a DEBSZ
|b 421529350
|
029 |
1 |
|
|a GBVCP
|b 803439865
|
029 |
1 |
|
|a NZ1
|b 13869876
|
029 |
1 |
|
|a AU@
|b 000065314434
|
029 |
1 |
|
|a AU@
|b 000067098719
|
035 |
|
|
|a (OCoLC)688637914
|z (OCoLC)704518473
|z (OCoLC)764548962
|z (OCoLC)768664194
|z (OCoLC)771168842
|z (OCoLC)798259730
|z (OCoLC)798716972
|z (OCoLC)842286161
|z (OCoLC)857301850
|z (OCoLC)961540394
|z (OCoLC)962634514
|z (OCoLC)988497143
|z (OCoLC)992059565
|z (OCoLC)1037937315
|z (OCoLC)1038574885
|z (OCoLC)1055369667
|z (OCoLC)1081284154
|z (OCoLC)1103272811
|z (OCoLC)1129362828
|z (OCoLC)1153024777
|z (OCoLC)1192331134
|z (OCoLC)1228581948
|z (OCoLC)1240525569
|z (OCoLC)1289516967
|z (OCoLC)1302260813
|
037 |
|
|
|a CL0500000268
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5gq7
|b JSTOR
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a QA76.9.A25
|b M44 2009eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mehan, Julie E.
|
245 |
1 |
4 |
|a The definitive guide to the C & A transformation :
|b the first publication of a comprehensive view Of the C & A transformation /
|c Julie E. Mehan, Waylon Krush.
|
260 |
|
|
|a Ely, U.K. :
|b IT Governance Pub.,
|c 2009.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
504 |
|
|
|a Includes bibliographical references and link to CD content.
|
505 |
0 |
0 |
|t Introduction --
|g Chap. 1.
|t An abridged history of information technology and information systems security --
|g Chap. 2.
|t The essential information systems security regulations --
|g Chap. 3.
|t The authorizaation process framework --
|g Chap. 4. The authorization process -- Establishing a foundation --
|g Chap. 5.
|t Pre-authorization activities -- The fundamentals --
|g Chap. 6.
|t Plan, initiate and implement authorization -- preparing for authorization --
|g Chap. 7.
|t Verfy, validate & authorize -- conducting the authorization --
|g Chap. 8.
|t Operate & maintain -- maintaining authorization --
|g Chap. 9.
|t Remove the infromation system from operation 309 --
|g Chap. 10.
|t Authorization package and supporting evidence --
|g Chap. 11.
|t C & A in the US department of defense --
|g Chap. 12.
|t Authorization in the Federal government --
|g Chap. 13.
|t The federal information security management act (FISMA) --
|g Chap. 14
|t Authorization and the system life cycle (SLC) --
|g Chap. 15.
|t Information systems security training and certification.
|
520 |
|
|
|a 'The Definitive Guide to the C&A Transformation' is the first comprehensive manual that sets out to explain the current standards and best practices. The book provides all the information needed to recognize, implement and manage the relevant authorization requirements, and therefore to achieve compliance with federal, local and agency laws and policies. Each chapter not only provides a list of related references but also offers recommendations for additional reading.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security
|z United States
|x Management.
|
650 |
|
0 |
|a Information technology
|x Security measures
|z United States.
|
650 |
|
0 |
|a Computer networks
|x Certification
|z United States.
|
650 |
|
0 |
|a Computer networks
|x Accreditation
|z United States.
|
650 |
|
0 |
|a Cyberinfrastructure
|z United States.
|
650 |
|
6 |
|a Sécurité informatique
|z États-Unis
|x Gestion.
|
650 |
|
6 |
|a Technologie de l'information
|z États-Unis
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Agrément
|z États-Unis.
|
650 |
|
6 |
|a Cyberinfrastructure
|z États-Unis.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Certification
|2 fast
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Cyberinfrastructure
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
700 |
1 |
|
|a Krush, Waylon.
|4 aut
|
776 |
0 |
8 |
|i Print version:
|a Mehan, Julie.
|t Definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation.
|d [Cambridgeshire, England] : IT Governance Publishing, 2015
|z 9781849280068
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh7fz
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00036110
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10439457
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391114
|
994 |
|
|
|a 92
|b IZTAP
|