Implementing cybersecurity : a guide to the National Institute of Standards and Technology Risk Management Framework / by Anne Kohnke, Ken Sigler and Dan Shoemaker.
By: Kohnke, Anne [author.].
Contributor(s): Sigler, Kenneth [author.] | Shoemaker, Dan [author.].
Series: Internal audit and IT audit.Publisher: Boca Raton, FL : CRC Press, ©2017Description: 313 pages ; 25 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781498785143 (Hardbook : alk. paper).Subject(s): Computer security | Computer networks -- Security measures | Information technology -- Security measures | Risk managementGenre/Form: Print books.
Contents:
Introduction to organizational security risk management -- Survey of existing risk management models -- Categorize information and information systems -- Select security controls -- Implement security controls -- Assess security controls -- Authorize information systems -- Monitor security state -- Practical application of the NIST risk management framework.
Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9 .A25 K63463 2017 (Browse shelf) | Available | AU00000000014190 |
Total holds: 0
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
QA76.9.A25 J224 2013 Computer security literacy : staying safe in a digital world / | QA76.9.A25 K36 2015 Introduction to modern cryptography / | QA76.9.A25 K36 2021 Introduction to modern cryptography / | QA76.9 .A25 K63463 2017 Implementing cybersecurity : a guide to the National Institute of Standards and Technology Risk Management Framework / | QA76.9.A25 L48 2018 Rethinking cybersecurity : strategy, mass effect, and states / | QA76.9.A25 L485 2018 Passwords : philology, security, authentication / | QA76.9 .A25 M33 2017 RIoT control : understanding and managing risks and the internet of things / |
Introduction to organizational security risk management -- Survey of existing risk management models -- Categorize information and information systems -- Select security controls -- Implement security controls -- Assess security controls -- Authorize information systems -- Monitor security state -- Practical application of the NIST risk management framework.