Cantitate/Preț
Produs

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework: Security, Audit and Leadership Series

Autor Anne Kohnke, Ken Sigler, Dan Shoemaker
en Limba Engleză Paperback – 29 aug 2022
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 29159 lei  22-36 zile +3944 lei  5-11 zile
  CRC Press – 29 aug 2022 29159 lei  22-36 zile +3944 lei  5-11 zile
Hardback (1) 75926 lei  22-36 zile +4867 lei  5-11 zile
  CRC Press – 8 mar 2017 75926 lei  22-36 zile +4867 lei  5-11 zile

Din seria Security, Audit and Leadership Series

Preț: 29159 lei

Preț vechi: 36448 lei
-20% Nou

Puncte Express: 437

Preț estimativ în valută:
5580 5797$ 4635£

Carte disponibilă

Livrare economică 13-27 ianuarie 25
Livrare express 27 decembrie 24 - 02 ianuarie 25 pentru 4943 lei

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781032402222
ISBN-10: 1032402229
Pagini: 338
Ilustrații: 40
Dimensiuni: 156 x 234 x 25 mm
Greutate: 1.07 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Seria Security, Audit and Leadership Series

Locul publicării:Boca Raton, United States

Public țintă

Professional Practice & Development

Cuprins

Introduction to Organizational Security Risk Management. Survey of Existing Risk Management Models. Step 1 – Categorize Information and Information Systems. Step 2 – Select Security Controls. Step 3 – Implement Security Controls. Step 4 – Assess Security Controls. Step 5 – Authorize Information Systems. Step 6 – Monitor Security State. Practical Application to the Implementation of the NIST Risk Management Framework.

Notă biografică

Anne Kohnke, Ken Sigler, Dan Shoemaker

Descriere

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk managemen