References

Dempsey K, ed. Information Security Continuous Monitoring (ISCM) for federal information systems and organizations. Gaithersburg, MD: US Department of Commerce, National Institute of Standards and Technology; 2011.

Guide for applying the risk management framework to federal information systems: A security life cycle approach Revision 1, ed. Gaithersburg, MD: US Department of Commerce, National Institute of Standards and Technology; 2010.

NIST Computer Security Publications. http://csrc.nist.gov/publications/PubsSPs.html Accessed 06.05.13.

Recommended security controls for federal information systems and organizations Revision 3, ed. Gaithersburg, MD: US Department of Commerce, National Institute of Standards and Technology; 2009.

Ross R, ed. Guide for assessing the security controls in federal information systems. Gaithersburg, MD: US Department of Commerce, Technology Administration, National Institute of Standards and Technology; 2006.

Stine K, ed. Guide for mapping types of information and information systems to security categories. Revision 1, ed. Gaithersburg, MD: US Department of Commerce, National Institute of Standards and Technology; 2008.

Swanson M, Hash J, Bowen P, eds. Guide for developing security plans for federal information systems. Revision 1, ed. Gaithersburg, MD: US Department of Commerce, National Institute of Standards and Technology; 2006.

US General Services Administration website. http://www.gsa.gov/portal/category/102371?utm_source=OCSIT&utm_medium=print-radio&utm_term=fedramp&utm_campaign=shortcuts Accessed 06.05.13.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset