|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_on1206396161 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201114t20202020enk ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d YDX
|d JSTOR
|d EBLCP
|d OCLCO
|d OCLCF
|d VT2
|d N$T
|d BRF
|d YDXIT
|d VLB
|d OCLCQ
|d OCLCO
|d FAU
|d FZL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1204635170
|a 1228613008
|a 1230256450
|a 1240519281
|a 1248695045
|a 1351588465
|
020 |
|
|
|a 9781787782464
|q (electronic book)
|
020 |
|
|
|a 1787782468
|q (electronic book)
|
020 |
|
|
|a 9781787782457
|q (electronic book)
|
020 |
|
|
|a 178778245X
|q (electronic book)
|
020 |
|
|
|a 9781787782471
|q (electronic book)
|
020 |
|
|
|a 1787782476
|q (electronic book)
|
020 |
|
|
|z 9781787782440
|
024 |
8 |
|
|a 9781787782464
|
029 |
1 |
|
|a AU@
|b 000068335469
|
029 |
1 |
|
|a AU@
|b 000068857308
|
029 |
1 |
|
|a AU@
|b 000069692825
|
035 |
|
|
|a (OCoLC)1206396161
|z (OCoLC)1204635170
|z (OCoLC)1228613008
|z (OCoLC)1230256450
|z (OCoLC)1240519281
|z (OCoLC)1248695045
|z (OCoLC)1351588465
|
037 |
|
|
|a 22573/ctv17dt80t
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b G35 2020eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gamble, William.
|
245 |
1 |
4 |
|a The Cybersecurity Maturity Model Certification (CMMC) :
|b a Pocket Guide /
|c William Gamble.
|
264 |
|
1 |
|a Ely, Cambridgeshire :
|b IT Governance Publishing,
|c 2020.
|
264 |
|
4 |
|c ©2020
|
300 |
|
|
|a 1 online resource (75 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|a text file
|2 rda
|
505 |
0 |
|
|a Cover -- Title -- Copyright -- About the Author -- Contents -- Chapter 1: An introduction to the US Department of Defense digital supply chain -- The Cybersecurity Maturity Model Certification (CMMC) -- Chapter 2: Terms and definitions -- Chapter 3: Who needs to comply with the CMMC? -- Maturity levels -- Assessors -- Organizations -- Chapter 4: CMMC implementation -- The 14 domains of NIST SP 800-171 Rev. 2 -- The three additional domains in the CMMC -- Chapter 5: The road to certification -- Gap analysis and POA & Ms -- Implementation -- Audit -- Certification -- Cost -- Chapter 6: CMMC implications
|
520 |
|
|
|a A clear, concise primer on the CMMC (Cybersecurity Maturity Model Certification), this pocket guide: Summarizes the CMMC and proposes useful tips for implementation Discusses why the scheme has been created Covers who it applies to Highlights the requirements for achieving and maintaining compliance.
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on May 03, 2021).
|
542 |
|
|
|f IT Governance Publishing ©
|g 2020
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
630 |
0 |
0 |
|a Cybersecurity Maturity Model Certification.
|
650 |
|
0 |
|a Computer security
|x Standards.
|
650 |
|
6 |
|a Sécurité informatique
|x Normes.
|
650 |
|
7 |
|a Computer security
|x Standards
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Gamble, William.
|t Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide.
|d Ely : IT Governance Ltd, ©2020
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv17f12mb
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6386681
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2641161
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17100676
|
994 |
|
|
|a 92
|b IZTAP
|