Cargando…

The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide /

A clear, concise primer on the CMMC (Cybersecurity Maturity Model Certification), this pocket guide: Summarizes the CMMC and proposes useful tips for implementation Discusses why the scheme has been created Covers who it applies to Highlights the requirements for achieving and maintaining compliance...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gamble, William
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire : IT Governance Publishing, 2020.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_on1206396161
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 201114t20202020enk ob 000 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d YDX  |d JSTOR  |d EBLCP  |d OCLCO  |d OCLCF  |d VT2  |d N$T  |d BRF  |d YDXIT  |d VLB  |d OCLCQ  |d OCLCO  |d FAU  |d FZL  |d OCLCQ  |d OCLCO 
019 |a 1204635170  |a 1228613008  |a 1230256450  |a 1240519281  |a 1248695045  |a 1351588465 
020 |a 9781787782464  |q (electronic book) 
020 |a 1787782468  |q (electronic book) 
020 |a 9781787782457  |q (electronic book) 
020 |a 178778245X  |q (electronic book) 
020 |a 9781787782471  |q (electronic book) 
020 |a 1787782476  |q (electronic book) 
020 |z 9781787782440 
024 8 |a 9781787782464 
029 1 |a AU@  |b 000068335469 
029 1 |a AU@  |b 000068857308 
029 1 |a AU@  |b 000069692825 
035 |a (OCoLC)1206396161  |z (OCoLC)1204635170  |z (OCoLC)1228613008  |z (OCoLC)1230256450  |z (OCoLC)1240519281  |z (OCoLC)1248695045  |z (OCoLC)1351588465 
037 |a 22573/ctv17dt80t  |b JSTOR 
050 4 |a QA76.9.A25  |b G35 2020eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Gamble, William. 
245 1 4 |a The Cybersecurity Maturity Model Certification (CMMC) :  |b a Pocket Guide /  |c William Gamble. 
264 1 |a Ely, Cambridgeshire :  |b IT Governance Publishing,  |c 2020. 
264 4 |c ©2020 
300 |a 1 online resource (75 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |a text file  |2 rda 
505 0 |a Cover -- Title -- Copyright -- About the Author -- Contents -- Chapter 1: An introduction to the US Department of Defense digital supply chain -- The Cybersecurity Maturity Model Certification (CMMC) -- Chapter 2: Terms and definitions -- Chapter 3: Who needs to comply with the CMMC? -- Maturity levels -- Assessors -- Organizations -- Chapter 4: CMMC implementation -- The 14 domains of NIST SP 800-171 Rev. 2 -- The three additional domains in the CMMC -- Chapter 5: The road to certification -- Gap analysis and POA & Ms -- Implementation -- Audit -- Certification -- Cost -- Chapter 6: CMMC implications 
520 |a A clear, concise primer on the CMMC (Cybersecurity Maturity Model Certification), this pocket guide: Summarizes the CMMC and proposes useful tips for implementation Discusses why the scheme has been created Covers who it applies to Highlights the requirements for achieving and maintaining compliance. 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from digital title page (viewed on May 03, 2021). 
542 |f IT Governance Publishing ©  |g 2020 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR All Purchased 
630 0 0 |a Cybersecurity Maturity Model Certification. 
650 0 |a Computer security  |x Standards. 
650 6 |a Sécurité informatique  |x Normes. 
650 7 |a Computer security  |x Standards  |2 fast 
776 0 8 |i Print version:  |a Gamble, William.  |t Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide.  |d Ely : IT Governance Ltd, ©2020 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctv17f12mb  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6386681 
938 |a EBSCOhost  |b EBSC  |n 2641161 
938 |a YBP Library Services  |b YANK  |n 17100676 
994 |a 92  |b IZTAP