Implementing Cybersecurity A Guide to the National Institute of Standards and Technology Risk Management Framework

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain special...

Full description

Saved in:
Bibliographic Details
Main Authors: Kohnke, Anne (Author), Sigler, Kenneth (Author), Shoemaker, Dan (Author)
Format: Book
Language:English
Published: Boca Raton, FL CRC Press, Taylor & Francis Group 2017
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000ntm a2200000 i 4501
001 wils-929750
005 2018727161856
008 190213t2017 -US ag| |#001 ##ENG#D
020 # # |a 9781498785143  |q hardback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a QA76.9.A25  |b K634 2017 
100 1 # |a Kohnke, Anne  |e author 
245 0 0 |a Implementing Cybersecurity  |b A Guide to the National Institute of Standards and Technology Risk Management Framework  |c Anne Kohnke, Ken Sigler and Dan Shoemaker 
264 # 1 |a Boca Raton, FL  |b CRC Press, Taylor & Francis Group  |c 2017 
300 # # |a xxiii, 313 pages :  |b illustrations  |c 25 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references and indexes 
520 # # |a The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context. 
650 # 0 |a Computer security 
650 # 0 |a Computer networks  |x Security measures 
650 # 0 |a Information technology  |x Security measures 
700 1 # |a Sigler, Kenneth  |e author 
700 1 # |a Shoemaker, Dan  |e author 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=929750 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||