The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive s
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of c
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive s
This volume of writings by outstanding twentieth-cnetury American historians presents one aspect of the problem which results from the conflict between the subjectivity of the historian and the object
Divided into three sections, Linda Phyllis Austern collects eighteen, cross-disciplinary essays written by some of the most important names in the field to look at this stimulating topic. The first se