Security Controls Evaluation, Testing, and Assessment Handbook.

Bibliographic Details
Main Author: Johnson, Leighton
Corporate Author: EBSCOhost
Format: eBook
Language:English
Published: San Diego : Elsevier Science & Technology, 2019.
Edition:Second edition.
Subjects:
Online Access:Connect to the full text of this electronic book

MARC

LEADER 00000nam a2200000 i 4500
001 in00004788605
003 OCoLC
005 20230330053451.7
006 m o d
007 cr un|---aucuu
008 191130s2019 cau o 000 0 eng d
024 8 |a 99996246681 
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d UKMGB  |d OCLCO  |d OPELS  |d GZM  |d OCLCF  |d OCLCQ  |d UKAHL  |d OCLCQ  |d YDX  |d N$T  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ 
019 |a 1129172404 
020 |a 9780128206249 
020 |a 0128206241 
020 |z 9780128184271  |q (pbk.) 
020 |z 0128184272 
035 |a (OCoLC)1129162761  |z (OCoLC)1129172404 
037 |a 9780128206249  |b Ingram Content Group 
050 4 |a QA76.9.A25  |b J64 2019 
082 0 4 |a 005.8  |2 23 
100 1 |a Johnson, Leighton. 
245 1 0 |a Security Controls Evaluation, Testing, and Assessment Handbook. 
250 |a Second edition. 
264 1 |a San Diego :  |b Elsevier Science & Technology,  |c 2019. 
300 |a 1 online resource ( 790 pages) : 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Front Cover; Security Controls Evaluation, Testing, and Assessment Handbook; Security Controls Evaluation, Testing, and Assessment Handbook; Copyright; Contents; Introduction; Introduction for second edition; Section I; 1 -- Introduction to assessments; 2 -- Risk, security, and assurance; Risk management; Risk assessments; Security controls; Privacy; 3 -- Statutory and regulatory GRC; Statutory requirements; Privacy Act-1974; CFAA-1986; ECPA-1986; CSA-1987; CCA-1996; HIPAA-1996; EEA-1996; GISRA-1998; USA PATRIOT ACT-2001; FISMA-2002; Sarbanes-Oxley (SOX)-2002 
505 8 |a Health Information Technology Economic and Clinical Health Act (HITECH)-2009Federal Information Security Modernization Act (FISMA 2.0)-2014; The Cybersecurity Enhancement Act (CEA)-2014; The Cybersecurity Information Sharing Act (CISA)-2015; National Cybersecurity Protection Advancement Act (CPAA)-2015; Executive Orders/Presidential Directives; Federal processing standards; FIPS-140-Security requirements for cryptographic modules; FIPS-186-Digital Signature Standard (DSS); FIPS-197-Advanced Encryption Standard (AES) 
505 8 |a FIPS-199-Standards for security categorization of federal information and information systemsFIPS-200-Minimum security requirements for federal information and information systems; FIPS-201-Personal Identity Verification (PIV) of federal employees and contractors; FIPS-202-SHA-3 standard: permutation-based hash and extendable-output functions; Regulatory requirements; DOD; DODI 8500.01-cybersecurity; DODI 8510.01-``Risk Management Framework (RMF) for DoD Information Technology (IT)''; CNSS; CNSSI 1253-Security Categorization and Control Selection for National Security Systems 
505 8 |a CNSSI 1254-Risk management framework documentation, data element standards, and reciprocity process for national security s ... CNSSP 22-Policy on information assurance risk management for national security systems; HHS; HIPAA Security Rule; HIPAA Privacy Rule; HITECH breach reporting; OMB requirements for each agency; Circulars; A-130, T-5-managing information as a strategic resource-July 2016; A-130, T-4, Appendix III-published in 2000; Memoranda; M-02-01 Guidance for Preparing and Submitting Security Plans of Action and Milestones (Oct 2001) 
505 8 |a M04-04E-Authentication guidance for federal agenciesM06-15 Safeguarding PII; M06-19 PII reporting; M07-16 Safeguarding against and responding to the breach of Personally Identifiable Information; M10-15 FY 2010 Reporting instructions for the Federal Information Security Management Act and Agency Privacy Management; M10-28 clarifying cybersecurity responsibilities and activities of the Executive Office of the President and the Department ... ; M14-03 and M14-04; 4 -- Federal Risk Management Framework requirements; Federal civilian agencies; DOD-DIACAP-RMF for DOD IT; IC-ICD 503; FedRAMP 
500 |a NIST Cybersecurity Framework 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Electronic books.  |2 local 
710 2 |a EBSCOhost 
776 1 8 |i Print version:  |a Johnson, Leighton.  |t Security Controls Evaluation, Testing, and Assessment Handbook.  |d San Diego : Elsevier Science & Technology, ©2019  |z 9780128184271 
856 4 0 |u http://proxy.library.tamu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2182562  |z Connect to the full text of this electronic book  |t 0 
945 |b 45081 
955 |a YBP purchased EBSCO DDA e-records 
980 |b ebook  |c 99996246681  |f DDA  |g 565702  |k USD  |m 105.55  |q 1  |s AcqMono Conventional  |t Demand driven acquisitions (DDA)  |u Vendor order reference number  |v ZYBP  |y PDA  |z Electronic resource 
999 f f |i f97014ca-609f-4327-a5d1-d1ffd8a82bf2  |s 4a82b106-2cda-40c7-86c7-077321442d46  |t 0 
952 f f |a Texas A&M University  |b College Station  |c Electronic Resources  |d Available Online  |t 0  |e QA76.9.A25 J64 2019  |h Library of Congress classification 
998 f f |a QA76.9.A25 J64 2019  |t 0  |l Available Online