Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

The definitive guide to the C & A transformation [electronic resource] : the first publication of a comprehensive view Of the C & A transformation / Julie E. Mehan, Waylon Krush.

By: Mehan, Julie E.
Contributor(s): Krush, Waylon [].
Material type: TextTextPublisher: Ely, U.K. : IT Governance Pub., 2009Description: 1 online resource.ISBN: 184928007X (electronic bk.); 9781849280075 (electronic bk.); 1849280061; 9781849280068.Subject(s): Computer security -- United States -- Management | Information technology -- Security measures -- United States | Computer networks -- Certification -- United States | Computer networks -- Accreditation -- United States | Cyberinfrastructure -- United States | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- GeneralGenre/Form: Electronic books. | Electronic books.DDC classification: 005.8 Online resources: EBSCOhost
Contents:
Introduction -- An abridged history of information technology and information systems security -- The essential information systems security regulations -- The authorizaation process framework -- Pre-authorization activities - The fundamentals -- Plan, initiate and implement authorization - preparing for authorization -- Verfy, validate & authorize - conducting the authorization -- Operate & maintain - maintaining authorization -- Remove the infromation system from operation 309 -- Authorization package and supporting evidence -- C&A in the US department of defense -- Authorization in the Federal government -- The federal information security management act (FISMA) -- Authorization and the system life cycle (SLC) -- Information systems security training and certification --
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Title from title screen.

Includes bibliographical references and link to CD content.

Introduction -- Chap. 1. An abridged history of information technology and information systems security -- Chap. 2. The essential information systems security regulations -- Chap. 3. The authorizaation process framework -- Chap. 4. The authorization process - Establishing a foundation -- Chap. 5. Pre-authorization activities - The fundamentals -- Chap. 6. Plan, initiate and implement authorization - preparing for authorization -- Chap. 7. Verfy, validate & authorize - conducting the authorization -- Chap. 8. Operate & maintain - maintaining authorization -- Chap. 9. Remove the infromation system from operation 309 -- Chap. 10. Authorization package and supporting evidence -- Chap. 11. C&A in the US department of defense -- Chap. 12. Authorization in the Federal government -- Chap. 13. The federal information security management act (FISMA) -- Chap. 14 Authorization and the system life cycle (SLC) -- Chap. 15. Information systems security training and certification --

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

The definitive guide to the C & A transformation by Mehan, Julie E. ©2009
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter