Implementing Cybersecurity A Guide to the National Institute of Standards and Technology Risk Management Framework
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain special...
Saved in:
Main Authors: | , , |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton, FL
CRC Press, Taylor & Francis Group
2017
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000ntm a2200000 i 4501 | ||
---|---|---|---|
001 | wils-929750 | ||
005 | 2018727161856 | ||
008 | 190213t2017 -US ag| |#001 ##ENG#D | ||
020 | # | # | |a 9781498785143 |q hardback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a QA76.9.A25 |b K634 2017 |
100 | 1 | # | |a Kohnke, Anne |e author |
245 | 0 | 0 | |a Implementing Cybersecurity |b A Guide to the National Institute of Standards and Technology Risk Management Framework |c Anne Kohnke, Ken Sigler and Dan Shoemaker |
264 | # | 1 | |a Boca Raton, FL |b CRC Press, Taylor & Francis Group |c 2017 |
300 | # | # | |a xxiii, 313 pages : |b illustrations |c 25 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references and indexes |
520 | # | # | |a The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Information technology |x Security measures |
700 | 1 | # | |a Sigler, Kenneth |e author |
700 | 1 | # | |a Shoemaker, Dan |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=929750 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |