Информатика и вычислительная техника
  • формат pdf
  • размер 5.28 МБ
  • добавлен 22 февраля 2011 г.
Richard A. Caralli, Julia H. Allen, David W. White. CERT Resilience Management Model
CERT Resilience Management Model : A Maturity Model for Managing Operational Resilience (SEI Series in Software Engineering)
1058 pages
published 2010

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It integrates these best practices into a unified, capability-focused maturity model that encompasses security, business continuity, and IT operations. By using CERT-RMM, organizations can escape silo-driven approaches to managing operational risk and align to achieve strategic resilience management goals.

This book both introduces CERT-RMM and presents the model in its entirety. It begins with essential background for all professionals, whether they have previously used process improvement models or not. Next, it explains CERT-RMM’s Generic Goals and Practices and discusses various approaches for using the model. Short essays by a number of contributors illustrate how CERT-RMM can be applied for different purposes or can be used to improve an existing program. Finally, the book provides a complete baseline understanding of all 26 process areas included in CERT-RMM.

Part One summarizes the value of a process improvement approach to managing resilience, explains CERT-RMM’s conventions and core principles, describes the model architecturally, and shows how itsupports relationships tightly linked to your objectives.

Part Two focuses on using CERT-RMM to establish a foundation for sustaining operational resilience management processes in complex environments where risks rapidly emerge and change.

Part Three details all 26 CERT-RMM process areas, from asset definition through vulnerability resolution. For each, complete descriptions of goals and practices are presented, with realistic examples.

Part Four contains appendices, including Targeted Improvement Roadmaps, a glossary, and other reference materials.

This book will be valuable to anyone seeking to improve the mission assurance of high-value services, including leaders of large enterprise or organizational units, security or business continuity specialists, managers of large IT operations, and those using methodologies such as ISO 27000, COBIT, ITIL, or CMMI.
Читать онлайн
Смотрите также

Ответы на экзаменационные вопросы по техническим средствам информатизации

Шпаргалка
  • формат doc
  • размер 1.4 МБ
  • добавлен 09 июля 2011 г.
УРТТ, 2007. Экзаменационные вопросы: Направления развития средств вычислительной техники. Персональный компьютер. Состав. Корпус и блок питания ПК. Форм-фактор, классификация. Система охлаждения компонентов компьютерной системы. Конструкция системных плат, форм фактор ATX. Конструкция системных плат, форм фактор BTX. Конструкция системной платы, сокеты, слоты расширения. Набор микросхем системной логики (НМСЛ/чипсет). Параметры и конструкция. Про...

CobiT-4.1 Research. Краткое содержание стандарта по аудиту информационных систем

  • формат pdf
  • размер 1.79 МБ
  • добавлен 07 февраля 2011 г.
Стандарт CobiT v.4.1 Framework, Control Objectives, Management Guidlines, Maturity Models (на английском языке)

ITSM. IT Service Management. Русское издание

  • формат pdf
  • размер 8.11 МБ
  • добавлен 10 июня 2010 г.
ITSM (IT Service Management, управление ИТ-обслуживанием) — подмножество библиотеки ITIL, описывающее процессный подход к предоставлению информационных технологий и обеспечению их использования. Данная часть ITIL получила наибольшую известность в силу того, что предоставление и поддержка ИТ-услуг является первичной задачей ИТ-отделов и специализированных ИТ-компаний, которые зачастую сталкиваются с недостаточной зрелостью данных процессов, необхо...

Shirley Lacy, David Norfolk. Configuration Management: Expert Guidance for IT Service Managers and Practitioners

  • формат pdf
  • размер 885.33 КБ
  • добавлен 23 февраля 2011 г.
169 pages 2010 British Informatics Society Limited Configuration management is the tracking, recording and monitoring of the elements of a business IT system and any changes and developments. This book combines the ITIL(r) view of configuration management with expert feedback from practitioners who have implemented configuration management in a wide range of real environments. Invaluable to IT professionals who are implementing configuration ma...

Tomczyk Michael S. The Home Computer Wars

  • формат pdf
  • размер 45.87 МБ
  • добавлен 16 января 2012 г.
Compute Books, 1984 - 269 p. If you are 1., a computer industry history enthusiast, and 2., ever owned a Commodore computer such as the PET, VIC-20, or Commodore 64, then you should try to find a copy of The Home Computer Wars by Michael S. Tomczyk. Most computer history books I have read seem to only mention Commodore as a footnote, never seeming to give it its proper dues or recognizing how it impacted the industry. As far as I know, this book...