Security controls evaluation, testing, and assessment handbook / Leighton Johnson.
Material type: TextAmsterdam : San Diego Academic Press, c2020Edition: Second editionDescription: ix, 788 pages : illustration. ; 24 cmISBN: 9780128184271 (pbk.)Subject(s): Computer security | Information technology -- Security measures | Electronic government information -- Security measures | Risk managementLOC classification: QA76.9 .A25 | J64 2020Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | QA76.9 .A25 J64 2020 c.1 (Browse shelf (Opens below)) | 1 | Available | 00012800 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 J64 2008 c.3 Microsoft® Windows server 2008 security resource kit / | QA76.9.A25 J64 2015 c.1 Security policies and implementation issues / | QA76.9.A25 J64 2016 c.1 Security controls evaluation, testing, and assessment handbook / | QA76.9 .A25 J64 2020 c.1 Security controls evaluation, testing, and assessment handbook / | QA76.9.A25 K33 2007 c.1 Endpoint security / | QA76.9.A25 K56 2018 c.1 The hacker playbook 3 : practical guide to penetration testing / | QA76.9.A25 K68 2003 c.1 The information systems security officer's guide : |
Includes bibliographical references and index.
1. Introduction to Assessments 2. Risk and Security 3. Statutory & Regulatory GRC 4. Federal RMF Requirements 5. Risk Management Framework – SP 800-37, rev.1 6. Roles and Responsibilities 7. Assessment Process 8. Assessment Methods 9. Assessment Techniques for each kind of control 10. System and Network Assessments 11. Security Components Fundamentals 12. Cybersecurity Controls 13. CUI Controls 14. Evidence of Assessment 15. Reporting 16. Conclusion
There are no comments on this title.