語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FISMA compliance handbook
~
Moulder, Patricia.
FISMA compliance handbook
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
FISMA compliance handbook/ Laura P. Taylor ; Patricia Moulder, Technical editor.
作者:
Taylor, Laura P.
其他作者:
Moulder, Patricia.
出版者:
Waltham, MA :Syngress, : 2013.,
面頁冊數:
xx, 359 p. :ill. ; : 24 cm.;
標題:
Electronic government information - Security measures - United States. -
電子資源:
click for full text (2015 TAEBDC PDA eBooks Trial, Trial Period: 2015.6.3-2015.12.31)
ISBN:
9780124058712 (electronic bk.)
FISMA compliance handbook
Taylor, Laura P.
FISMA compliance handbook
[electronic resource] /Laura P. Taylor ; Patricia Moulder, Technical editor. - 2nd ed. - Waltham, MA :Syngress,2013. - xx, 359 p. :ill. ;24 cm.
Includes bibliographical references and index.
"FISMA, also known as Title III of the E-Government Act (Public Law107-347), requires that all systems and applications that reside on U.S. government networks undergo a formal security assessment before being put into production. System authorization is the ultimate output of a FISMA compliance project, and a system or application cannot be authorized unless it meets specific security control requirements. However, keep in mind that no system can be completely secure - unless it is powered off and locked in a vault. Of course then it is not very useable. Determining the security controls for the system is a balancing act between making the system useable and making the system secure. These two endeavors are often at odds with each other. In order to find the balance, security experts analyze the probability and impact of potential vulnerabilities being exploited (or not) and then make risk-based decisions based on the analysis. Clearly the goal of FISMA is to force federal agencies to put into production secure systems and applications. Once put into production, FISMA requires that system owners analyze risk periodically on the production system in order to find vulnerabilities, and fix them, before they are exploited by adversaries"--
ISBN: 9780124058712 (electronic bk.)
LCCN: 2013025238Subjects--Corporate Names:
799874
United States.
Family and Medical Leave Act of 1993.Subjects--Topical Terms:
904264
Electronic government information
--Security measures--United States.
LC Class. No.: KF4850.A3282002 / A2 2013
Dewey Class. No.: 342.73/0662
FISMA compliance handbook
LDR
:02166cam a2200253 a 4500
001
810435
005
19990703204218.0
008
150720s2013 ne a sb 001 0 eng
010
$a
2013025238
020
$a
9780124058712 (electronic bk.)
020
$a
9780124058712
035
$a
14000169
040
$a
DLC
$b
eng
$c
DLC
$e
rda
$d
DLC
041
0
$a
eng
042
$a
pcc
043
$a
n-us---
050
0 0
$a
KF4850.A3282002
$b
A2 2013
082
0 0
$a
342.73/0662
$2
23
100
1
$a
Taylor, Laura P.
$3
1026963
245
1 0
$a
FISMA compliance handbook
$h
[electronic resource] /
$c
Laura P. Taylor ; Patricia Moulder, Technical editor.
250
$a
2nd ed.
260
$a
Waltham, MA :
$b
Syngress,
$c
2013.
300
$a
xx, 359 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
520
2
$a
"FISMA, also known as Title III of the E-Government Act (Public Law107-347), requires that all systems and applications that reside on U.S. government networks undergo a formal security assessment before being put into production. System authorization is the ultimate output of a FISMA compliance project, and a system or application cannot be authorized unless it meets specific security control requirements. However, keep in mind that no system can be completely secure - unless it is powered off and locked in a vault. Of course then it is not very useable. Determining the security controls for the system is a balancing act between making the system useable and making the system secure. These two endeavors are often at odds with each other. In order to find the balance, security experts analyze the probability and impact of potential vulnerabilities being exploited (or not) and then make risk-based decisions based on the analysis. Clearly the goal of FISMA is to force federal agencies to put into production secure systems and applications. Once put into production, FISMA requires that system owners analyze risk periodically on the production system in order to find vulnerabilities, and fix them, before they are exploited by adversaries"--
$c
Provided by publisher.
610
1 0
$a
United States.
$t
Family and Medical Leave Act of 1993.
$3
799874
650
0
$a
Electronic government information
$x
Security measures
$z
United States.
$3
904264
650
0
$a
Computer security
$x
Law and legislation
$z
United States.
$3
904262
650
0
$a
Data protection
$x
Law and legislation
$z
United States.
$3
655681
700
1
$a
Moulder, Patricia.
$3
1026964
856
4 0
$u
http://www.sciencedirect.com/science/book/9780124058712
$z
click for full text (2015 TAEBDC PDA eBooks Trial, Trial Period: 2015.6.3-2015.12.31)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入