Gå direkte til innholdet

Sommersalg på pocket fra 79,- »

Til startsiden
Logg inn
Søk etter din neste leseopplevelse
NIST SP 800-128 Guide for Security-Focused Configuration Management of Informati: Recomendations

NIST SP 800-128 Guide for Security-Focused Configuration Management of Informati: Recomendations

heftet, Engelsk, 2011
152,-
Sendes innen 6-17 virkedager
NIST SP 800-128 August 2011

An information system is typically in a constant state of change in response to new, enhanced, corrected, or updated hardware and software capabilities, patches for correcting software flaws and other errors to existing components, new security threats, changing business functions, etc. Implementing information system changes almost always results in some adjustment to the system configuration. To ensure that the required adjustments to the system configuration do not adversely affect the security of the information system or the organization from operation of the information system, a well-defined configuration management process that integrates information security is needed. Organizations apply configuration management (CM) for establishing baselines and for tracking, controlling, and managing many aspects of business development and operation (e.g., products, services, manufacturing, business processes, and information technology). Organizations with a robust and effective CM process need to consider information security implications with respect to the development and operation of information systems including hardware, software, applications, and documentation. Effective CM of information systems requires the integration of the management of secure configurations into the organizational CM process or processes. For this reason, this document assumes that information security is an integral part of an organization's overall CM process; however, the focus of this document is on implementation of the information system security aspects of CM, and as such the term security-focused configuration management (SecCM) is used to emphasize the concentration on information security. Though both IT business application functions and security-focused practices are expected to be integrated as a single process, SecCM in this context is defined as the management and control of configurations for information systems to enable security and facilitate the management of information security risk.

Why buy a book you can download for free?

First you gotta find it and make sure it's the latest version, not always easy. Then you gotta print it using a network printer you share with 100 other people - and its outta paper - and the toner is low (take out the toner cartridge, shake it, then put it back). If it's just 10 pages, no problem, but if it's a 250-page book, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. An engineer that's paid $75 an hour has to do this himself (who has assistant's anymore?).

If you are paid more than $10 an hour and use an ink jet printer, buying this book will save you money.

It's much more cost-effective to just order the latest version from Amazon.com

This public domain material is published by 4th Watch Books. We publish tightly-bound, full-size books at 8 1/2 by 11 inches, with glossy covers. 4th Watch Books is a Service Disabled Veteran Owned Small Business (SDVOSB) and is not affiliated with the National Institute of Standards and Technology.

For more titles published by 4th Watch, please visit: cybah.webplus.net

A full copy of all the pertinent cybersecurity standards is available on DVD-ROM in the CyberSecurity Standards Library disc which is available at Amazon.com.

GSA P-100 Facilities Standards for the Public Buildings Service

GSA P-140 Child Care Center Design Guide

GSA Standard Level Features and Finishes for U.S. Courts Facilities

GSA Courtroom Technology Manual

NIST SP 500-299 NIST Cloud Computing Security Reference Architecture

NIST SP 500-291 NIST Cloud Computing Standards Roadmap Version 2

NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 1 & 2

NIST SP 1800-8 Securing Wireless Infusion Pumps

Anbefalt for deg

  • Gå til Pragmatic Thinking and Learnings produktside
    Andy Hunt
    heftet
  • Gå til C# 13 and .NET 9 – Modern Cross-Platform Development Fundamentalss produktside
    Mark J. Price
    heftet
  • Gå til Tour of C++, As produktside
    Bjarne Stroustrup
    heftet
  • Gå til The Data Warehouse Toolkits produktside
    Ralph Kimball, Margy Ross
    heftet
  • Gå til Deep Learnings produktside
    Christopher M. Bishop, Hugh Bishop
    innbundet
  • Gå til Excel for økonomistudenters produktside
    Morten Helbæk, Børre A. Olsen
    heftet
  • Gå til Modern Software Engineerings produktside
    David Farley
    heftet
  • Gå til Coding with Roblox Lua in 24 Hourss produktside
    Official Roblox Books(Pearson)
    heftet
  • Gå til Refactorings produktside
    Martin Fowler
    innbundet
  • Gå til C++ Software Designs produktside
    Klaus Iglberger
    heftet
  • Gå til The CTO ] CIO Bible: The Mission Objectives Strategies And Tactics Needed To Be A Super Successful CTO ] CIOs produktside
    Rorie Devine
    heftet
  • Gå til Test Driven Development in Cs produktside
    James W. Grenning
    heftet

Mer om Adlibris

Om Adlibris

Vi er Nordens største nettbokhandel, og tilbyr over 13 millioner boktitler og det meste av det beste innen spill, leker, hobby og garn. Vår misjon er å være en moderne bokhandel for alle bokelskere: et innbydende sted for lesing, læring og skaping. Det er hva som driver oss, hver dag. Adlibris er en del av Bonnier Group.

  • Alltid gode priser

  • Fri frakt over 299,-

  • Nordens største bokhandel

Meld deg på nyhetsbrev

Motta våre beste boktips, nyheter og gode tilbud. Registrer deg nå, og få 10% rabatt på det første kjøpet ditt. Tilbudet gjelder kun nye abonnenter og privatkunder. Rabatten gjelder ikke norske bøker utgitt 2024, fag- og studielitteratur, digitale bøker og gavekort.