|800-37||Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Lifecycle Approach||102|
|800-30||Guide for Conducting Risk Assessment||95|
|800-34||Contingency Planning Guide for Federal Information Systems||149|
|800-39||Managing Information Security Risk: Organization Mission and Information System View||88|
|800-61||Computer Security Incident Handling Guide||79|
|800-64||Security Considerations in the System Development Lifecycle||67|
|800-65||Integrating IT Security into the Capital Planning and Investment Control Process||65|
|800-100||Information Security Handbook: A Guide for Managers||178|
Wednesday, July 13, 2016
Readings for work
Trying to finish them by August 31
I am busily loading up a playlist for DefCon so of course I had to turn to "The Ultimate Get Psyched" Playlist as published by Bar...
Next week will be 25% of the planned 52 week run. I'll let you guys decide, stop or keep going?
So again today I am seeing all sorts of tweets about how great Mad Max - Fury Road is. Most revolving around the fact that Furiousa was a k...
Signed up for the Pentesting with Kali Linux course from Offensive Security. Going to try for my OSCP. If anyone has any hints, not chea...