|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
KNOVEL_ocn823738965 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
120924s2012 ne a ob 001 0 eng d |
010 |
|
|
|z 2012030642
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCQ
|d OCLCO
|d N$T
|d IDEBK
|d KNOVL
|d DEBBG
|d KNOVL
|d TEFOD
|d OCLCQ
|d TEFOD
|d OCLCQ
|d UKAHL
|d VT2
|d C6I
|d VLY
|d LOA
|d DST
|d AAA
|d OCLCQ
|d OCLCF
|
019 |
|
|
|a 1103265444
|a 1162043340
|a 1202545148
|a 1230258209
|a 1240510183
|a 1295608495
|a 1300481828
|a 1303359181
|
020 |
|
|
|a 9781597497398
|q (electronic bk.)
|
020 |
|
|
|a 1597497398
|q (electronic bk.)
|
020 |
|
|
|z 9781597497374
|q (pbk.)
|
020 |
|
|
|a 1283852306
|
020 |
|
|
|a 9781283852302
|
020 |
|
|
|a 1597497371
|
020 |
|
|
|a 9781597497374
|
029 |
1 |
|
|a DEBBG
|b BV040677660
|
035 |
|
|
|a (OCoLC)823738965
|z (OCoLC)1103265444
|z (OCoLC)1162043340
|z (OCoLC)1202545148
|z (OCoLC)1230258209
|z (OCoLC)1240510183
|z (OCoLC)1295608495
|z (OCoLC)1300481828
|z (OCoLC)1303359181
|
037 |
|
|
|a 10E30923-C76F-4490-8BB2-02FC7FF86A38
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.585
|b .M48 2012eb
|
072 |
|
7 |
|a COM
|x 060030
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060080
|2 bisacsh
|
082 |
0 |
4 |
|a 004.67/82
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Metheny, Matthew.
|
245 |
1 |
0 |
|a Federal cloud computing :
|b the definitive guide for cloud service providers /
|c Matthew Metheny.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Elsevier/Syngress,
|c 2012.
|
300 |
|
|
|a 1 online resource (xxi, 437 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "In recent years 'cloud computing' has emerged as a model for providing IT infrastructure, resources and services that has the potential to drive significant value to organizations through increased IT efficiency, agility and innovation. However, Federal agencies who were early adopters of cloud computing have learned that there are many challenges and risks that must be addressed in order to realize these benefits"--
|c Provided by publisher.
|
505 |
0 |
|
|a Ch. 1 Introduction to the Federal Cloud Computing Strategy -- Introduction -- A Historical View of Federal IT -- The Early Years and the Mainframe Era -- Shifting to Minicomputer -- Decentralization: The Microcomputer ("Personal Computer") -- Transitioning to Mobility -- Evolution of Federal IT Policy -- Cloud Computing: Drivers in Federal IT Transformation -- Drivers for Adoption -- Cloud Benefits -- Decision Framework for Cloud Migration -- Selecting Services to Move to the Cloud -- Provisioning Cloud Services Effectively -- Managing Services Rather Than Assets -- Summary -- ch. 2 Cloud Computing Standards -- Introduction -- Standards Development Primer -- Cloud Computing Standardization Drivers -- Federal Laws and Policy -- Adoption Barriers -- Identifying Standards for Federal Cloud Computing Adoption -- Standards Development Organizations (SDOs) and Other Community-Driven Organizations -- Standards Inventory -- Summary -- ch. 3 A Case for Open Source -- Introduction -- Open Source and the Federal Government -- OSS Adoption Challenges: Acquisition and Security -- Acquisition Challenges -- Security Challenges -- OSS and Federal Cloud Computing -- Summary -- ch. 4 Security and Privacy in Public Cloud Computing -- Introduction -- Security and Privacy in the Context of the Public Cloud -- Federal Privacy Laws and Policies -- Privacy Act of 1974 -- E-Government Act of 2002, Federal Information Security Management Act (FISMA) -- OMB Memorandum Policies -- Safeguarding Privacy Information -- Privacy Controls -- Data Breaches, Impacts, and Consequences -- Security and Privacy Issues -- Summary -- ch. 5 Applying the NIST Risk Management Framework -- Introduction to FISMA -- Purpose -- Role and Responsibilities -- Risk Management Framework Overview -- The Role of Risk Management -- The NIST RMF and the System Development Life Cycle -- NIST RMF Process -- Information System Categorization -- Security Control Selection -- Security Controls Implementation -- Security Controls Assessment -- Information System Authorization -- Security Controls Monitoring -- Summary -- ch. 6 Risk Management -- Introduction to Risk Management -- Federal Information Security Risk Management Practices -- Overview of Enterprise-Wide Risk Management -- Components of the NIST Risk Management Process -- Multi-Tiered Risk Management -- NIST Risk Management Process -- Framing Risk -- Risk Assessment -- Responding to Risk -- Monitoring Risk -- Comparing the NIST and ISO/IEC Risk Management Processes -- Summary -- ch. 7 Comparison of Federal and International Security Certification Standards -- Introduction -- Overview of Certification and Accreditation -- Evolution of the Federal C&A Processes -- Towards a Unified Approach to C&A -- NIST and ISO/IEC Information Security Standards -- Boundary and Scope Definition -- Security Policy -- Risk Management Strategy (Context) -- Risk Management Process -- Security Objectives and Controls -- Summary -- ch. 8 FedRAMP Primer -- Introduction to FedRAMP -- FedRAMP Policy Memo -- Primary Stakeholders -- FedRAMP Concept of Operations -- Operational Processes -- Third Party Assessment Organization Program -- Summary -- ch. 9 The FedRAMP Cloud Computing Security Requirements -- Security Control Selection Process -- Selecting the Security Control Baseline -- Tailoring and Supplementing Security Control Baseline -- FedRAMP Cloud Computing Overlay -- FedRAMP Cloud Computing Security Requirements -- Policy and Procedures -- Harmonizing FedRAMP Requirements -- Assurance of External Service Providers Compliance -- Approaches to Implementing FedRAMP Security Controls -- FedRAMP Security Control Requirements -- Summary -- ch. 10 Security Assessment and Authorization: Governance, Preparation, and Execution -- Introduction to the Security Assessment Process -- Governance in the Security Assessment -- Preparing for the Security Assessment -- Security Assessment Customer Responsibilities -- Security Assessment Provider Responsibilities -- Executing the Security Assessment Plan -- Summary -- ch. 11 Strategies for Continuous Monitoring -- Introduction to Continuous Monitoring -- Organizational Governance -- CM Strategy -- CM Program -- The Continuous Monitoring Process -- Defining a CM Strategy -- Implementing a CM Program -- Review and Update CM Strategy and Program -- Continuous Monitoring within FedRAMP -- Summary -- ch. 12 Cost-Effective Compliance Using Security Automation -- Introduction -- CM Reference Architectures -- Continuous Asset Evaluation, Situational Awareness, and Risk Scoring Reference Architecture -- CAESARS Framework Extension Reference Architecture -- Security Automation Standards and Specifications -- Security Content Automation Protocol -- Cybersecurity Information Exchange Framework -- Operational Visibility and Continuous Monitoring -- Summary -- ch. 13 A Case Study for Cloud Service Providers -- Case Study Scenario: "Healthcare Exchange" -- Applying the Risk Management Framework within FedRAMP -- Categorize Information System -- Select Security Controls -- Implement and Document Security Controls -- Assessing Security Controls -- Summary.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Web services
|x Government policy.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Services Web
|x Politique gouvernementale.
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Intranets & Extranets.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Web
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cloud computing
|x Security measures.
|2 fast
|0 (OCoLC)fst02061555
|
776 |
0 |
8 |
|i Print version:
|a Metheny, Matthew.
|t Federal cloud computing.
|b 1st ed.
|d Amsterdam ; Boston : Elsevier/Syngress, 2012
|w (DLC) 2012030642
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpFCCTDGCB/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24926096
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10629431
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 485889
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis24345421
|
994 |
|
|
|a 92
|b IZTAP
|