Hidden fields
Libros Libros
" Cost-Effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security Responsibilities and Accountability Should Be Made Explicit 6. Computer Security Requires a Comprehensive and Integrated Approach 7. Computer... "
An Introduction to Computer Security: The NIST Handbook - Página 9
por Barbara Guttman, Edward A. Roback - 1996 - 276 páginas
Vista completa - Acerca de este libro

Executive Guide: Information Security Management, Learning from Leading ...

United States. General Accounting Office. Accounting and Information Management Division - 1998 - 72 páginas
...Pub 800-14) in September 1996.6 Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...Management 3. Computer Security Should Be Cost-Effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security...
Vista completa - Acerca de este libro

Weak Computer Security in Government: Is the Public at Risk? : Hearing ...

United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 232 páginas
...Pub 800-14) in September 1996. 8 Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...Management 3. Computer Security Should Be Cost-Effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security...
Vista completa - Acerca de este libro

Weak Computer Security in Government: Is the Public at Risk? : Hearing ...

United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 264 páginas
...Pub 800-14) in September 1996.6 Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...of Sound Management 3. Computer Security Should Be CostrEffective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5....
Vista completa - Acerca de este libro

Information Security Management: Learning from Leading Organizations

Jack L. Brock, Jr. - 2000 - 70 páginas
...Technology Systems in September 1996. Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...Management 3. Computer Security Should Be Cost-effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security...
Vista completa - Acerca de este libro

Computer Security Report Card: Hearing Before the Subcommittee on Government ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 240 páginas
...Securing Information Technology Systems taken directly from NIST SP 800-14. 1 . Computer security supports the mission of the organization 2. Computer security...management 3. Computer security should be cost-effective 4. System owners have security responsibilities outside their own organizations 5. Computer security responsibilities...
Vista completa - Acerca de este libro

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

Susan Hansche - 2005 - 814 páginas
...interdependencies that may exist with other controls. The SP 800-12 principles of computer security are: 1. Computer security should support the mission of...Computer security is constrained by societal factors (p. 9). The eight principles are based on the Organization for Economic Cooperation and Development's...
Vista previa limitada - Acerca de este libro

Oracle Identity Management: Governance, Risk, and Compliance Architecture ...

Marlin B. Pohlman - 2008 - 552 páginas
...practices are described within this document. The eight principles are 1. Computer security supports the mission of the organization. 2. Computer security...of sound management. 3. Computer security should be cost effective. 4. Systems owners have security responsibilities outside their own organizations. 5....
Vista previa limitada - Acerca de este libro

Executive guide information security management, learning from leading ...

1998 - 69 páginas
...Pub 800-14) in September 1996. 6 Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...Management 3. Computer Security Should Be Cost-Effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security...
Vista completa - Acerca de este libro




  1. Mi biblioteca
  2. Ayuda
  3. Búsqueda avanzada de libros