-
2
-
-
85179212996
-
-
The Free Dictionary, www.thefreedictionary.com
-
-
-
-
4
-
-
85179294403
-
-
July
-
CobiT Steering Committee, IT Governance Institute, COBIT Control Objectives, 3rd ed., July 2000.
-
(2000)
COBIT Control Objectives
-
-
-
5
-
-
33751339650
-
-
July
-
CobiT Steering Committee, IT Governance Institute, COBIT Executive Summary, 3rd ed., July 2000.
-
(2000)
COBIT Executive Summary
-
-
-
6
-
-
21244436836
-
-
CobiT Steering Committee, IT Governance Institute, COBIT Framework, 3rd ed., July 2000.
-
(2000)
COBIT Framework
-
-
-
7
-
-
33749657001
-
-
CobiT Steering Committee, IT Governance Institute, COBIT Management Guidelines, 3rd ed., July 2000.
-
(2000)
COBIT Management Guidelines
-
-
-
8
-
-
85179208432
-
CSOs Prioritize Security Spending for 2003
-
Cosgrove, Lorraine, ‘‘CSOs Prioritize Security Spending for 2003,’’ CSO Online, CSO Research Reports, January 7, 2003.
-
(2003)
CSO Online, CSO Research Reports
-
-
Cosgrove, L.1
-
9
-
-
85179280984
-
Security Spending on the Rise
-
Martin, James A., ‘‘Security Spending on the Rise,’’ iQMagazine, September/ October 2003.
-
Iqmagazine
-
-
Martin, J.A.1
-
11
-
-
85179232994
-
Accounting and Information Management Division, Information Security Risk Assessment: Practices of Leading Organizations
-
November
-
United States General Accounting Office, Accounting and Information Management Division, Information Security Risk Assessment: Practices of Leading Organizations, A Supplement to GAO’s May 1998 Executive Guide on Information Security Management, GAO/IAM-00-33, November 1999.
-
(1999)
A Supplement to GAO’s May 1998 Executive Guide on Information Security Management
-
-
-
12
-
-
85179247001
-
-
Federal Trade Commission, Standards for Safeguarding Customer Information; Final Rule, 16 CFR Part 314, Federal Register, Vol. 67, No. 100, May 23, 2002. www.ftc.gov/os/2002/05/67fr36585.pdf
-
(2002)
Standards for Safeguarding Customer Information
, vol.67
, Issue.100
-
-
-
15
-
-
85179287318
-
A NIST Handbook
-
October
-
An Introduction to Computer Security: A NIST Handbook, NIST Special Publication 800–12, October 1995. http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html
-
(1995)
NIST Special Publication
, pp. 800-812
-
-
-
16
-
-
85179291128
-
-
American Institute of Certified Public Accountants, Service Organizations: Applying SAS No. 70, as Amended: AICPA Guide, 2004.
-
(2004)
Service Organizations: Applying SAS
, Issue.70
-
-
-
18
-
-
1842829828
-
Recommendations of the National Institute of Standards and Technology
-
July
-
Risk Management Guide: Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-30, July 2002. http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
-
(2002)
NIST Special Publication
, pp. 800-830
-
-
-
19
-
-
85179259650
-
-
August
-
Common Criteria for Information Technology Security Evaluation, Version 2.1, CCIMB-99-031, August 1999.
-
(1999)
Version 2.1, CCIMB
-
-
-
21
-
-
85179236958
-
-
Guide for Developing Security Plans for Information Technology Systems, NIST Special Publication 800-18, December 1998. http://csrc.nist.gov/publications/nistpubs/800-18/Planguide.PDF
-
(1998)
NIST Special Publication 800-18
-
-
-
22
-
-
85179264829
-
-
Security Self-Assessment Guide for Information Technology Systems, NIST Special Publication 800-26, November 2001. http://csrc.nist.gov/publications/nistpubs/800-26/sp800-26.pdf
-
(2001)
NIST Special Publication 800-26
-
-
-
23
-
-
85179242032
-
-
Guide for the Security Certification and Accreditation of Federal Information Systems, NIST Special Publication 800-37, May 2004. http://csrc.nist.gov/publications/nistpubs/800-37/SP800-37-final.pdf
-
(2004)
NIST Special Publication 800-37
-
-
-
25
-
-
85179248506
-
-
The NIST Security Configuration Checklists Program, NIST Special Publication 800-70, August 12, 2004. http://csrc.nist.gov/checklists/index.html
-
(2004)
NIST Special Publication 800-70
-
-
-
26
-
-
85179236958
-
-
Guide for Developing Security Plans for Information Technology Systems, NIST Special Publication 800-18, December 1998. http://csrc.nist.gov/publications/nistpubs/800-18/Planguide.PDF
-
(1998)
NIST Special Publication 800-18
-
-
-
28
-
-
85179289860
-
-
Guide for Selecting Automated Risk Analysis Tools, NIST Special Publication 500-174, October 1989. http://csrc.nist.gov/publications/nistpubs/500-174/sp174.txt
-
(1989)
NIST Special Publication
, pp. 174-500
-
-
-
30
-
-
85179296626
-
-
General Support Systems and Major Applications Inventory Guide, NIST Publications, July 2002. http://csrc.nist.gov/fasp/FASPDocs/risk-mgmt/GSSMAInventory-Guide.doc
-
(2002)
NIST Publications
-
-
-
31
-
-
85179272383
-
-
Guide for Mapping Types of Information and Information Systems to security categories, NIST special Publications 800-60, June 2004.
-
(2004)
NIST Special Publications 800-60
-
-
-
33
-
-
85179267614
-
-
Milton, Thomas J., Rabe, James G., and Wilhoite, Charles, Economic Analysis of Intangible Assets and Intellectual Properties, 1999.
-
(1999)
Economic Analysis of Intangible Assets and Intellectual Properties
-
-
Milton, T.J.1
Rabe, J.G.2
Wilhoite, C.3
-
37
-
-
0004043454
-
-
Duxbury Press
-
Albright, S. Christian, Winston, Wayne L., and Zappe, Christopher, Data Analysis and Decision Making, Duxbury Press, 1999.
-
(1999)
Data Analysis and Decision Making
-
-
Albright, S.C.1
Winston, W.L.2
Zappe, C.3
-
39
-
-
85179245262
-
A Guide to Interview Guides
-
Digital Advisor for Research Projects
-
Kennedy, Mary, ‘‘A Guide to Interview Guides,’’ Teacher Education Doctoral Students, Digital Advisor for Research Projects. http://ed-web3/educ.msu.edu/digiatladvisor/ResearchFiles/InterviewGuide.htm
-
Teacher Education Doctoral Students
-
-
Kennedy, M.1
-
44
-
-
85179285841
-
Art, IT Needs to do better at planning for the worst
-
Pfenning, Art, IT Needs to do better at planning for the worst, InternetWeek, October 8, 2001.
-
(2001)
Internetweek
-
-
-
46
-
-
0006100649
-
Smashing the Stack for Fun and Profit
-
Aleph One, Smashing the Stack for Fun and Profit, Phrack Magazine, issue 49, article 14, November 8, 1996.
-
(1996)
Phrack Magazine
, Issue.49
-
-
-
47
-
-
85179209507
-
-
National Industrial Security Program Operating Manual (NISPOM), DoD 5220.22-M, January 1995. http://www.dss.mil/isec/nispom_0195.htm
-
(1995)
-
-
-
49
-
-
24944551836
-
-
NIST Special Publication 800-53, Final Draft, January
-
National Institute of Standards and Technology, Recommended Security Controls for Federal Information Systems, NIST Special Publication 800-53, Final Draft, January 2005. http://csrc.nist.gov/publications/drafts/SP-800-53-FinalDraft.pdf
-
(2005)
Recommended Security Controls for Federal Information Systems
-
-
-
54
-
-
85179295604
-
If you fail to prepare, be prepared to fail
-
Hills, Roy, ‘‘If you fail to prepare, be prepared to fail’’, SC Magazine, November 2004, p. 48.
-
(2004)
SC Magazine
, pp. 48
-
-
Hills, R.1
-
56
-
-
85179284307
-
-
August
-
Common Criteria Evaluation Methodology, Version 1.0, CEM-99/045, August 1999.
-
(1999)
Version 1.0, CEM-99/045
-
-
-
57
-
-
85179255003
-
Finding Holes in Your PBX Before Someone Else Does
-
August
-
PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does, NIST Special Publication 800-24, August 2000. http://csrc.nist.gov/publications/nistpubs/800-24/sp800-24pbx.pdf
-
(2000)
NIST Special Publication
, pp. 800-824
-
-
-
58
-
-
85179200537
-
-
NIST Special Publication 800-27
-
Engineering Principles for Information Technology Security (A Baseline for Achieving Security), NIST Special Publication 800-27, June 2001. http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf
-
(2001)
A Baseline for Achieving Security
-
-
-
59
-
-
85179299144
-
-
NIST Special Publication 800-70
-
The NIST Security Configuration Checklists Program, NIST Special Publication 800-70, August 12, 2004. http://csrc.nist.gov/checklists/index.html
-
(2004)
Security Configuration Checklists Program
, pp. 12
-
-
-
60
-
-
85179262532
-
-
Wright State University, College of Engineering and Computer Science, Dayton, OH
-
Mateti, Prabhaker, Port Scanning Lecture. Wright State University, College of Engineering and Computer Science, Dayton, OH. www.cs.wright.edu/_pmateti/InternetSecurity/Lectures/Probing
-
Port Scanning Lecture
-
-
Mateti, P.1
-
68
-
-
85129190759
-
-
Glossary of Security Terms, ASIS International. www.asisonline.org/library/glossary/index.xml
-
Glossary of Security Terms
-
-
-
71
-
-
85179271769
-
Conversion Guide for Heating, Ventilation
-
Shore Facilities Ozone-Depleting Substances (ODS) Conversion Guide for Heating, Ventilation, Air-Conditioning and Refrigeration (HVAC&R) and Fire Protection Systems, January 2002. http://enviro.nfesc.navy.mil/ps/FacilityODSCOnv/halon.htm
-
(2002)
Air-Conditioning and Refrigeration (HVAC&R) and Fire Protection Systems
-
-
-
72
-
-
85179293436
-
National Fire Alarm Code
-
National Fire Alarm Code, NFPA 72(02), National Fire Protection Association, 2002.
-
(2002)
NFPA
, vol.72
, Issue.2
-
-
-
73
-
-
84876638218
-
Fire alarm and detection systems
-
August
-
McEwen, R.H.L., Fire alarm and detection systems, Canadian Building Digest, CBD-233, August 1984.
-
(1984)
Canadian Building Digest
-
-
McEwen, R.H.L.1
-
74
-
-
79957937978
-
-
Early Detection, Data Center Journal, June 14, 2004.
-
(2004)
Early Detection
-
-
-
75
-
-
85179257717
-
Non-residential structure fires in 2000
-
U.S. Fire Administration/National Fire Data Center, Non-residential structure fires in 2000, Topical Fire Research Series, Vol. 3, issue 10, June 2004. www.usfa.fema.gov
-
(2004)
Topical Fire Research Series
, vol.3
, Issue.10
-
-
-
76
-
-
85179274282
-
Fire Protection Design Criteria
-
July
-
Fire Protection Design Criteria, DOE Standard, DoE-STD-1066-99, U.S. Department of Energy, Washington, DC 20585, July 1999.
-
(1999)
DOE Standard, Doe-Std-1066-99
-
-
-
77
-
-
85179257413
-
-
National Industrial Security Program Operating Manual (NISPOM), DoD 5220.22-M, January 1995. http://www.dss.mil/isec/nispom_0195.htm
-
(1995)
-
-
-
81
-
-
85179205792
-
Approach to Risk: Position Paper on the Approach to Risk, Methodologies Dealing with This and the Technical and Community Information Required for Implementation
-
Approach to Risk: Position Paper on the Approach to Risk, Methodologies Dealing with This and the Technical and Community Information Required for Implementation, Environmental Risk Management Authority, New Zealand, December 2002, ER-OP-03-02 12/02.
-
(2002)
Environmental Risk Management Authority
-
-
-
82
-
-
85179287208
-
Preparing Information on Risks, Costs and Benefits for Applications Under the Hazardous Substances and New Organisms Act 1996
-
Preparing Information on Risks, Costs and Benefits for Applications Under the Hazardous Substances and New Organisms Act 1996, Environmental Risk Management Authority, New Zealand, July 2000, ISBN 0-478-21507-1, ERTG-03-01 07/00.
-
(2000)
Environmental Risk Management Authority
-
-
-
84
-
-
85179242744
-
Guidelines for Automatic Data Processing Physical Security and Risk Management
-
Guidelines for Automatic Data Processing Physical Security and Risk Management, Federal Information Processing Standards Publication 31 (FIPS Pub. 31), National Bureau of Standards, June 1974.
-
(1974)
Federal Information Processing Standards Publication
, vol.31
-
-
-
87
-
-
85179278611
-
Information Security Risk Assessment: Practices of Leading Organizations, A Supplement to GAO’s May 1998 Executive Guide on Information Security Management
-
Information Security Risk Assessment: Practices of Leading Organizations, A Supplement to GAO’s May 1998 Executive Guide on Information Security Management. United States General Accounting Office, Accounting and Information Management Division, November 1999. GAO/AMID-00-33. http://www.gao.gov/special.pubs/ai00033.pdf
-
(1999)
United States General Accounting Office
-
-
-
89
-
-
85179285026
-
Generally Accepted Information Security Principles
-
‘‘Generally Accepted Information Security Principles’’ GAISP v3.0, Information Systems Security Association. http://www.issa.org/gaisp/_pdfs/v30.pdf
-
GAISP V3.0
-
-
-
93
-
-
85179253990
-
Benefits of IT Certifications
-
March
-
Landoll, Douglas J. ‘‘Benefits of IT Certifications’’ Certification Magazine, March 2004.
-
(2004)
Certification Magazine
-
-
Landoll, D.J.1
-
94
-
-
42649104807
-
Selecting the Risk Assessment Method of Choice
-
Passori, AI, ‘‘Selecting the Risk Assessment Method of Choice,’’ META Group, July 21, 2004. http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci994851,00.html
-
(2004)
META Group
-
-
Passori, A.I.1
-
97
-
-
85179220620
-
Decision Making: A Technical Guide to Identifying, Assessing and Evaluating Risks, Costs and Benefits
-
Decision Making: A Technical Guide to Identifying, Assessing and Evaluating Risks, Costs and Benefits. Environmental Risk Management Authority, New Zealand, ER-TG-05-1 03/04, March 2004, ISBN 0-478-21523-1.
-
(2004)
Environmental Risk Management Authority
-
-
-
99
-
-
84887421143
-
-
INFOSEC Assessment Methodology, ‘‘National Security Agency.’’ http://www.iatrp.com/iam.cfm
-
National Security Agency
-
-
-
103
-
-
85179242744
-
Guidelines for Automatic Data Processing Physical Security and Risk Management
-
June
-
Guidelines for Automatic Data Processing Physical Security and Risk Management, Federal Information Processing Standards Publication 31 (FIPS Pub. 31), National Bureau of Standards, June 1974.
-
(1974)
Federal Information Processing Standards Publication
, vol.31
-
-
-
105
-
-
85179220603
-
-
‘‘Acquisition Management Policy,’’ Federal Aviation Administration, February 2005. http://fast.faa.gov
-
(2005)
Acquisition Management Policy
-
-
|