My Account Log in

3 options

The definitive guide to the C&A transformation : the first publication of a comprehensive view of the C&A transformation / Julie E. Mehan, Waylon Krush.

Ebook Central Academic Complete Available online

View online

Ebook Central University Press Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Mehan, Julie E.
Contributor:
Krush, Waylon.
Language:
English
Subjects (All):
Computer security.
Computer networks--Certification.
Computer networks.
Information technology--Security measures.
Information technology.
Information technology--Certification.
Data protection.
Physical Description:
1 online resource (601 p.)
Edition:
1st edition
Other Title:
Definitive guide to the certification and accreditation transformation
Place of Publication:
Ely, U.K. : IT Governance Pub., 2009.
Language Note:
English
System Details:
text file
Summary:
'The Definitive Guide to the C&A Transformation' is the first comprehensive manual that sets out to explain the current standards and best practices. The book provides all the information needed to recognize, implement and manage the relevant authorization requirements, and therefore to achieve compliance with federal, local and agency laws and policies. Each chapter not only provides a list of related references but also offers recommendations for additional reading.
Contents:
INTRODUCTION; CHAPTER 1: AN ABRIDGED HISTORY OF INFORMATION TECHNOLOGY AND INFORMATION SYSTEMS SECURITY; CHAPTER 2: THE ESSENTIAL INFORMATION SYSTEMS SECURITY REGULATIONS; CHAPTER 3: THE AUTHORIZATION PROCESS FRAMEWORK; CHAPTER 4: THE AUTHORIZATION PROCESS - ESTABLISHING A FOUNDATION; CHAPTER 5: PRE-AUTHORIZATION ACTIVITIES - THE FUNDAMENTALS; CHAPTER 6: PLAN, INITIATE AND IMPLEMENT AUTHORIZATION - PREPARING FOR AUTHORIZATION; CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE - CONDUCTING THE AUTHORIZATION; CHAPTER 8: OPERATE & MAINTAIN - MAINTAINING AUTHORIZATION
CHAPTER 9: REMOVE THE INFORMATION SYSTEM FROM OPERATIONCHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE; CHAPTER 11: C&A IN THE US DEPARTMENT OF DEFENSE; CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT; CHAPTER 13: THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA); CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC); CHAPTER 15: INFORMATION SYSTEMS SECURITY TRAINING AND CERTIFICATION; CHAPTER 16: THE FUTURE - REVITALIZING AND TRANSFORMING C&A; THE RESOURCE CD; GLOSSARY; ACRONYMS
Notes:
Description based upon print version of record.
Includes bibliographical references.
ISBN:
9786612529047
9781849281294
1849281297
9781282529045
1282529048
9781849280075
184928007X
OCLC:
700919041

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account