Atjaunināt sīkdatņu piekrišanu

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework [Mīkstie vāki]

4.20/5 (10 ratings by Goodreads)
(Lawrence Technological University, USA), (Oakland Community College, USA), (Univ. of Detroit Mercy, USA)
  • Formāts: Paperback / softback, 338 pages, height x width: 234x156 mm, weight: 800 g, 40 Illustrations, black and white
  • Sērija : Security, Audit and Leadership Series
  • Izdošanas datums: 29-Aug-2022
  • Izdevniecība: Auerbach
  • ISBN-10: 1032402229
  • ISBN-13: 9781032402222
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 61,21 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 338 pages, height x width: 234x156 mm, weight: 800 g, 40 Illustrations, black and white
  • Sērija : Security, Audit and Leadership Series
  • Izdošanas datums: 29-Aug-2022
  • Izdevniecība: Auerbach
  • ISBN-10: 1032402229
  • ISBN-13: 9781032402222
Citas grāmatas par šo tēmu:

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk managemen



The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Introduction to Organizational Security Risk Management. Survey of
Existing Risk Management Models. Step 1 Categorize Information and
Information Systems. Step 2 Select Security Controls. Step 3 Implement
Security Controls. Step 4 Assess Security Controls. Step 5 Authorize
Information Systems. Step 6 Monitor Security State. Practical Application
to the Implementation of the NIST Risk Management Framework.
Anne Kohnke, Ken Sigler, Dan Shoemaker