Mostrando 21 - 40 Resultados de 139 Para Buscar '"NIST"', tiempo de consulta: 0.07s Limitar resultados
  1. 21
    Publicado 1972
    “…IUPAC-NIST solubility data series…”
    Revista digital
  2. 22
    Publicado 2012
    “…In film nist (Documental)…”
    Video
  3. 23
    por Raufaste, Noel J. (Ed.)
    Publicado 1994
    “…NIST special publication ; 871…”
    Libro
  4. 24
    Publicado 2002
    “…NIST special publication ; 990…”
    Libro
  5. 25
    Publicado 2002
    “…NIST special publication ; 991…”
    Libro
  6. 26
    Publicado 2010
    Libro electrónico
  7. 27
    Publicado 2020
    Materias:
    Libro electrónico
  8. 28
    Publicado 1968
    Libro
  9. 29
    Publicado 2024
    Tabla de Contenidos: “…Chapter 7 Risk Management -- Risk Management in the Business -- Understanding the Risk Management Life Cycle -- FFIEC Handbooks and Risk Management Guidance -- Governance and Risk Management Framework -- Risk Approvals and the Role of Committees -- Risk Identification and Analysis -- Third-Party Risk Management -- Regulatory Expectations For third-party Risk Management -- Compliance and Legal Risk Management -- Monitoring and Reporting -- Chapter Conclusion -- Case Study: Navigating Risk Management at Phoenix Innovations -- Chapter 8 The NIST Risk Management Framework -- The NIST Risk Management Framework -- Understanding RMF's Authorization Process -- NIST RMF in Practice: Step-by-Step Analysis -- Applicability to Regulatory Expectations -- Integrating NIST RMF into an Organization -- Using NIST RMF for Risk Assessment and Management -- NIST RMF and Technology Implementation -- Challenges and Solutions in Implementing NIST RMF -- NIST RMF and Third-Party Risk Management -- Chapter Conclusion -- Case Study: OmniTech Corporation and NIST RMF Implementation -- Sample RMF Authorization Document Package -- Chapter 9 Cybersecurity Metrics -- Understanding Cybersecurity Metrics -- The Importance of Metrics in cybersecurity -- The Role of Metrics in Decision-making and Resource Allocation -- Differentiating Between KPIs and KRIs -- The Role of Metrics in Compliance -- Challenges and Considerations -- Key Performance Indicators (KPIs) -- Key Risk Indicators (KRIs) -- Integrating KPIs and KRIs into Cybersecurity Strategy -- Chapter Conclusion -- Case Study: Transforming TechNova's Defense Landscape -- Chapter 10 Risk Assessments -- The Importance of Risk Assessments -- The FFIEC's Perspective on Risk Assessments -- NIST's Approach to Risk Assessments -- Risk Assessment Frameworks -- Conducting a Cybersecurity Risk Assessment -- Managing Third-Party Risks…”
    Libro electrónico
  10. 30
    Publicado 2003
    Libro
  11. 31
    por Thompson, Eric C. author
    Publicado 2018
    Tabla de Contenidos: “…Chapter 1: The Significance of Incident Response -- Chapter 2: Necessary Prerequisites -- Chapter 3: Incident Response Frameworks -- Chapter 4: Leadership, Teams, and Culture -- Chapter 5: The Incident Response Strategy -- Chapter 6: Cyber Risks and the Attack Lifecycle -- Chapter 7: Detection and Identification of Events -- Chapter 8: Containment -- Chapter 9: Eradication, Recovery, and Post-Incident Review -- Chapter 10: Continuous Monitoring of Incident Response Program -- Chapter 11: Incident Response Story -- Chapter 12: This Is a Full-Time Job -- Appendix A: NIST CSF…”
    Libro electrónico
  12. 32
    Publicado 2024
    Tabla de Contenidos: “…-- What is PII? It depends... -- NIST's definition of PII -- Third-party risk management -- SolarWinds attack -- Vendor management policy -- Vendor management contract clauses -- Critical vendors -- Train your staff -- Vendor risk rating -- Data loss protection…”
    Libro electrónico
  13. 33
    Publicado 2017
    Tabla de Contenidos: “…Introduction to the federal cloud computing strategy -- Cloud computing standards -- A case for open source -- Security and privacy in public cloud computing -- Applying the NIST risk management framework -- Risk management -- Comparison of FISMA with other security compliance standards -- FedRAMP primer -- The FedRAMP cloud computing security requirements -- Assessment and authorization (A & A): governance, preparation, and execution -- Strategies for continuous monitoring -- Cost-effective compliance using security automation appendix -- Federal-focused case study for cloud service providers using the CSA GRC stack…”
    Libro electrónico
  14. 34
    por Broad, James
    Publicado 2013
    Tabla de Contenidos: “…March, 2012); National Institute of Standards and Technology (NIST) Publications; Federal Information Processing Standards (FIPS) and Special Publications (SP); FIPS 199; FIPS 200; NIST SP 300-39; SP 300-37; SP 800-60; SP 800-53; SP 800-53A; SP 800-18; SP 800-70; SP 800-59…”
    Libro electrónico
  15. 35
    por Knapp, Eric
    Publicado 2011
    Tabla de Contenidos: “…Machine generated contents note: Chapter 1: Introduction Chapter 2: About Industrial Networks Chapter 3: Introduction to Industrial Network Security Chapter 4: Industrial Network Protocols Chapter 5: How Industrial Networks Operate Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception, Anomaly and Threat Detection Chapter 9: Monitoring Enclaves Chapter 10: Standards and Regulations Chapter 11: Common Pitfalls and Mistakes Appendix A: Protocol Resources Appendix B: Standards Organizations Appendix C: NIST Security Guidelines Glossary…”
    Libro electrónico
  16. 36
    Publicado 2022
    Tabla de Contenidos: “…-- 3 Cybersecurity 101 for Local Governments -- 4 What the Literature Says About Local Government Cybersecurity -- 5 Cyberattacks: Targetting Local Government -- 6 Managing Local Government Cybersecurity -- 7 Cybersecurity Policies for Local Government -- 8 People: The Root of The Problem -- 9 The NIST Cybersecurity Framework Demystified -- 10 Cybersecurity Law and Regulation for Local Government -- 11 Important Questions to Ask -- 12 The Future of Local Government Cybersecurity -- 13 Summary and Recommendations -- Index -- EULA…”
    Libro electrónico
  17. 37
    por Brown, Jason
    Publicado 2023
    Tabla de Contenidos: “…-- Exploring IT risks -- Human -- Technology -- Environmental -- The NIST RMF -- Tier 1 - organizational risk -- Tier 2 - mission/business process -- Tier 3 - information systems -- Applying risk management to IT resources -- Categorize -- Select -- Implement -- Assess -- Authorize -- Monitor -- Documenting in the SSP -- What is a risk register? …”
    Libro electrónico
  18. 38
    Publicado 2020
    “…This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. …”
    Libro electrónico
  19. 39
    Publicado 2013
    Tabla de Contenidos: “…SummaryReferences; 2 Federal Information Security Fundamentals; Information Security in the Federal Government; Brief History of Information Security; Civilian, Defense, and Intelligence Sector Practices; Sources of Guidance; Information Classification and Security Categorization; Security Controls; Certification and Accreditation Process; Legislative History of Information Security Management; Certification and Accreditation; FIPS 102; DITSCAP; NIACAP; NIST Special Publication 800-37; DIACAP; NIST Risk Management Framework; Joint Task Force Transformation Initiative…”
    Libro electrónico
  20. 40
    por Metheny, Matthew
    Publicado 2012
    Tabla de Contenidos: “…Machine generated contents note: Chapter 1 - Introduction to the Federal Cloud Computing Strategy Chapter 2 - Cloud Computing Standards Chapter 3 - A Case for Open Source Chapter 4 - Security and Privacy in Public Cloud Computing Chapter 5 - Applying the NIST Risk Management Framework Chapter 6 - Risk Management Chapter 7 - Comparison of FISMA with Other Security Compliance Standards Chapter 8 - FedRAMP Primer Chapter 9 - The FedRAMP Cloud Computing Security Requirements Chapter 10 - Assessment and Authorization (A&A): Governance, Preparation, and Execution Chapter 11 - Strategies for Continuous Monitoring Chapter 12 - Cost-Effective Compliance using Security Automation Appendix - Federal-focused Case Study for Cloud Service Providers using the CSA GRC Stack…”
    Libro electrónico