Coverart for item
The Resource The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation, Julie E. Mehan, Waylon Krush

The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation, Julie E. Mehan, Waylon Krush

Label
The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation
Title
The definitive guide to the C & A transformation
Title remainder
the first publication of a comprehensive view Of the C & A transformation
Statement of responsibility
Julie E. Mehan, Waylon Krush
Creator
Contributor
Author
Subject
Genre
Language
eng
Cataloging source
CtWfDGI
http://library.link/vocab/creatorName
Mehan, Julie E
Illustrations
illustrations
Index
no index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Krush, Waylon
http://library.link/vocab/subjectName
  • Computer security
  • Information technology
  • Computer networks
  • Computer networks
  • Cyberinfrastructure
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer networks
  • Computer security
  • Cyberinfrastructure
  • Information technology
  • United States
Label
The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation, Julie E. Mehan, Waylon Krush
Instantiates
Publication
Bibliography note
Includes bibliographical references and link to CD content
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
other
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Chap. 5.
  • Pre-authorization activities -- The fundamentals
  • Chap. 6.
  • Plan, initiate and implement authorization -- preparing for authorization
  • Chap. 7.
  • Verfy, validate & authorize -- conducting the authorization
  • Chap. 8.
  • Operate & maintain -- maintaining authorization
  • Chap. 9.
  • Remove the infromation system from operation 309
  • Introduction
  • Chap. 10.
  • Authorization package and supporting evidence
  • Chap. 11.
  • C & A in the US department of defense
  • Chap. 12.
  • Authorization in the Federal government
  • Chap. 13.
  • The federal information security management act (FISMA)
  • Chap. 14
  • Authorization and the system life cycle (SLC)
  • Chap. 1.
  • Chap. 15.
  • Information systems security training and certification
  • An abridged history of information technology and information systems security
  • Chap. 2.
  • The essential information systems security regulations
  • Chap. 3.
  • The authorizaation process framework
  • Chap. 4. The authorization process -- Establishing a foundation
Control code
ocn688637914
Dimensions
unknown
Extent
1 online resource
Form of item
online
Isbn
9781849280075
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Note
JSTOR
http://library.link/vocab/ext/overdrive/overdriveId
  • cl0500000268
  • 22573/ctt4k5gq7
Specific material designation
remote
System control number
(OCoLC)688637914
Label
The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation, Julie E. Mehan, Waylon Krush
Publication
Bibliography note
Includes bibliographical references and link to CD content
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
other
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Chap. 5.
  • Pre-authorization activities -- The fundamentals
  • Chap. 6.
  • Plan, initiate and implement authorization -- preparing for authorization
  • Chap. 7.
  • Verfy, validate & authorize -- conducting the authorization
  • Chap. 8.
  • Operate & maintain -- maintaining authorization
  • Chap. 9.
  • Remove the infromation system from operation 309
  • Introduction
  • Chap. 10.
  • Authorization package and supporting evidence
  • Chap. 11.
  • C & A in the US department of defense
  • Chap. 12.
  • Authorization in the Federal government
  • Chap. 13.
  • The federal information security management act (FISMA)
  • Chap. 14
  • Authorization and the system life cycle (SLC)
  • Chap. 1.
  • Chap. 15.
  • Information systems security training and certification
  • An abridged history of information technology and information systems security
  • Chap. 2.
  • The essential information systems security regulations
  • Chap. 3.
  • The authorizaation process framework
  • Chap. 4. The authorization process -- Establishing a foundation
Control code
ocn688637914
Dimensions
unknown
Extent
1 online resource
Form of item
online
Isbn
9781849280075
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Note
JSTOR
http://library.link/vocab/ext/overdrive/overdriveId
  • cl0500000268
  • 22573/ctt4k5gq7
Specific material designation
remote
System control number
(OCoLC)688637914

Library Locations

    • Copley LibraryBorrow it
      5998 Alcalá Park, San Diego, CA, 92110-2492, US
      32.771354 -117.193327
Processing Feedback ...