Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
FISMA Principles and Best Practices - Beyond Compliance (Hardcover)
Loot Price: R3,484
Discovery Miles 34 840
|
|
FISMA Principles and Best Practices - Beyond Compliance (Hardcover)
Expected to ship within 12 - 17 working days
|
While many agencies struggle to comply with Federal Information
Security Management Act (FISMA) regulations, those that have
embraced its requirements have found that their comprehensive and
flexible nature provides a sound security risk management framework
for the implementation of essential system security controls.
Detailing a proven approach for establishing and implementing a
comprehensive information security program, FISMA Principles and
Best Practices: Beyond Compliance integrates compliance review,
technical monitoring, and remediation efforts to explain how to
achieve and maintain compliance with FISMA requirements. Based on
the author's experience developing, implementing, and maintaining
enterprise FISMA-based information technology security programs at
three major federal agencies, including the U.S. Department of
Housing and Urban Development, the book gives you workable
solutions for establishing and operating an effective security
compliance program. It delineates the processes, practices, and
principles involved in managing the complexities of FISMA
compliance. Describing how FISMA can be used to form the basis for
an enterprise security risk management program, the book: *
Provides a comprehensive analysis of FISMA requirements *
Highlights the primary considerations for establishing an effective
security compliance program * Illustrates successful implementation
of FISMA requirements with numerous case studies Clarifying exactly
what it takes to gain and maintain FISMA compliance, Pat Howard,
CISO of the Nuclear Regulatory Commission, provides detailed
guidelines so you can design and staff a compliance capability,
build organizational relationships, gain management support, and
integrate compliance into the system development life cycle. While
there is no such thing as absolute protection, this up-to-date
resource reflects the important security concepts and ideas for
addressing information security requirements
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.