Download Security Controls Evaluation Testing And Assessment Handbook Book PDF

Download full Security Controls Evaluation Testing And Assessment Handbook books PDF, EPUB, Tuebl, Textbook, Mobi or read online Security Controls Evaluation Testing And Assessment Handbook anytime and anywhere on any device. Get free access to the library by create an account, fast download and ads free. We cannot guarantee that every book is in the library.

Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook
  • Author : Leighton Johnson
  • Publisher :Unknown
  • Release Date :2019-11-21
  • Total pages :788
  • ISBN : 9780128206249
GET BOOK HERE

Summary : Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts. Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts Shows readers how to implement proper evaluation, testing, assessment procedures and methodologies, with step-by-step walkthroughs of all key concepts Presents assessment techniques for each type of control, provides evidence of assessment, and includes proper reporting techniques

Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook
  • Author : Leighton Johnson
  • Publisher :Unknown
  • Release Date :2015-12-07
  • Total pages :678
  • ISBN : 9780128025642
GET BOOK HERE

Summary : Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed. Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts for the security controls in your organization. Learn how to implement proper evaluation, testing, and assessment procedures and methodologies with step-by-step walkthroughs of all key concepts. Shows you how to implement assessment techniques for each type of control, provide evidence of assessment, and proper reporting techniques.

The Security Risk Assessment Handbook

The Security Risk Assessment Handbook
  • Author : Douglas Landoll
  • Publisher :Unknown
  • Release Date :2016-04-19
  • Total pages :504
  • ISBN : 9781439821497
GET BOOK HERE

Summary : The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-wor

FISMA and the Risk Management Framework

FISMA and the Risk Management Framework
  • Author : Stephen D. Gantz,Daniel R. Philpott
  • Publisher :Unknown
  • Release Date :2012-12-31
  • Total pages :584
  • ISBN : 9781597496421
GET BOOK HERE

Summary : FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. Learn how to build a robust, near real-time risk management system and comply with FISMA Discover the changes to FISMA compliance and beyond Gain your systems the authorization they need

Handbook of Test Security

Handbook of Test Security
  • Author : James A. Wollack,John J. Fremer
  • Publisher :Unknown
  • Release Date :2013-09-02
  • Total pages :362
  • ISBN : 9781136747991
GET BOOK HERE

Summary : High stakes tests are the gatekeepers to many educational and professional goals. As such, the incentive to cheat is high. This Handbook is the first to offer insights from experts within the testing community, psychometricians, and policymakers to identify and develop best practice guidelines for the design of test security systems for a variety of testing genres. Until now this information was scattered and often resided inside testing companies. As a result, rather than being able to learn from each other’s experiences, each testing entity was left to re-create their own test security wheel. As a whole the book provides invaluable insight into the prevalence of cheating and “best practices” for designing security plans, training personnel, and detecting and investigating misconduct, to help develop more secure testing systems and reduce the likelihood of future security breaches. Actual case studies from a variety of settings bring to life how security systems really work. Examples from both domestic and international programs are provided. Highlights of coverage include: • Best practices for designing secure tests • Analysis of security vulnerabilities for all genres of testing • Practical cheating prevention and detection strategies • Lessons learned in actual security violations in high profile testing programs. Part I focuses on how tests are delivered for paper-and-pencil, technology-based, and classroom testing and writing assessment. Each chapter addresses the prevalence of the problem and threats to security, prevention, and detection. Part II addresses issues essential to maintaining a secure testing program such as planning and monitoring, physical security, the detection of group-based cheating, investigating misconduct, and communicating about security-related issues. Part III examines actual examples of cheating-- how the cheating was done, how it was detected, and the lessons learned. Part III provides insight into security issues within each of the Association of Test Publishers’ four divisions: certification/licensure, clinical, educational, and industrial/organizational testing. Part III’s conclusion revisits the issues addressed in the case studies and identifies common themes. Intended for organizations, professionals, educators, policy makers, researchers, and advanced students that design, develop, or use high stakes tests, this book is also ideal for graduate level courses on test development, educational measurement, or educational policy.

Handbook of System Safety and Security

Handbook of System Safety and Security
  • Author : Edward Griffor
  • Publisher :Unknown
  • Release Date :2016-10-02
  • Total pages :300
  • ISBN : 9780128038383
GET BOOK HERE

Summary : Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance. Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of ‘goal structured notation’ together with a ‘judgment calculus’ and their automation as a ‘rule set’ to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security

The IT Regulatory and Standards Compliance Handbook

The IT Regulatory and Standards Compliance Handbook
  • Author : Craig S. Wright
  • Publisher :Unknown
  • Release Date :2008-07-25
  • Total pages :750
  • ISBN : 0080560172
GET BOOK HERE

Summary : The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs. The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them The most comprehensive IT compliance template available, giving detailed information on testing all your IT security, policy and governance requirements A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues

Information Security Handbook

Information Security Handbook
  • Author : Darren Death
  • Publisher :Unknown
  • Release Date :2017-12-08
  • Total pages :330
  • ISBN : 9781788473262
GET BOOK HERE

Summary : Implement information security effectively as per your organization's needs. About This Book Learn to build your own information security framework, the best fit for your organization Build on the concepts of threat modeling, incidence response, and security analysis Practical use cases and best practices for information security Who This Book Is For This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you. What You Will Learn Develop your own information security framework Build your incident response mechanism Discover cloud security considerations Get to know the system development life cycle Get your security operation center up and running Know the various security testing types Balance security as per your business needs Implement information security best practices In Detail Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it's important. It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you'll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization's requirements. Style and approach This book takes a practical approach, walking you through information security fundamentals, along with information security best practices.

FISMA Compliance Handbook

FISMA Compliance Handbook
  • Author : Laura P. Taylor
  • Publisher :Unknown
  • Release Date :2013-08-20
  • Total pages :350
  • ISBN : 9780124059153
GET BOOK HERE

Summary : This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services. Includes new information on cloud computing compliance from Laura Taylor, the federal government’s technical lead for FedRAMP Includes coverage for both corporate and government IT managers Learn how to prepare for, perform, and document FISMA compliance projects This book is used by various colleges and universities in information security and MBA curriculums

Handbook of Human Factors Testing and Evaluation

Handbook of Human Factors Testing and Evaluation
  • Author : Samuel G. Charlton,Thomas G. O'Brien
  • Publisher :Unknown
  • Release Date :2019-09-25
  • Total pages :568
  • ISBN : 9781000751390
GET BOOK HERE

Summary : Like the first edition, the revision of this successful Handbook responds to the growing need for specific tools and methods for testing and evaluating human-system interfaces. Indications are that the market for information on these tools and applications will continue to grow in the 21st century. One of the goals of offering a second edition is to expand and emphasize the application chapters, providing contemporary examples of human factors test and evaluation (HFTE) enterprises across a range of systems and environments. Coverage of the standard tools and techniques used in HFTE have been updated as well. New features of the Handbook of Human Factors Testing and Evaluation include: *new chapters covering human performance testing, manufacturing ergonomics, anthropometry, generative design methods, and usability testing; *updated tools and techniques for modeling, simulation, embedded testing, training assessment, and psychophysiological measurement; *new applications chapters presenting human factors testing examples in aviation and avionics, forestry, road safety, and software systems; and *more examples, illustrations, graphics and tables have been added. The orientation of the current work has been toward breadth of coverage rather than in-depth treatment of a few issues or techniques. Experienced testers will find much that is familiar, as well as new tools, creative approaches, and a rekindled enthusiasm. Newcomers will discover the diversity of issues, methods, and creative approaches that make up the field. In addition, the book is written in such a way that individuals outside the profession should learn the intrinsic value and pleasure in ensuring safe, efficient, and effective operation, as well as increased user satisfaction through HFTE.

An Introduction to Computer Security

An Introduction to Computer Security
  • Author : Barbara Guttman,Edward A. Roback
  • Publisher :Unknown
  • Release Date :1995-04-01
  • Total pages :276
  • ISBN : 0788128302
GET BOOK HERE

Summary : Covers: elements of computer security; roles and responsibilities; common threats; computer security policy; computer security program and risk management; security and planning in the computer system life cycle; assurance; personnel/user issues; preparing for contingencies and disasters; computer security incident handling; awareness, training, and education; physical and environmental security; identification and authentication; logical access control; audit trails; cryptography; and assessing and mitigating the risks to a hypothetical computer system.

Responsive Security

Responsive Security
  • Author : Meng-Chow Kang
  • Publisher :Unknown
  • Release Date :2013-10-18
  • Total pages :259
  • ISBN : 9781466584310
GET BOOK HERE

Summary : Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. Demonstrates the viability and practicality of the approach in today’s information security risk environment Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches Provides comprehensive coverage of the issues and challenges faced in managing information security risks today The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations. Responsive Security: Be Ready to Be Secure examines the theories and knowledge in current literature, as well as the practices, related issues, and dilemmas experienced during the study. It discusses the reflexive analysis and interpretation involved in the final research cycles, and validates and refines the concepts, framework, and methodology of a responsive security approach for managing information security risk in a constantly changing risk environment.

HCISPP Study Guide

HCISPP Study Guide
  • Author : Timothy Virtue,Justin Rainey
  • Publisher :Unknown
  • Release Date :2014-12-11
  • Total pages :210
  • ISBN : 9780128020890
GET BOOK HERE

Summary : The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC2. The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification. Provides the most complete and effective study guide to prepare you for passing the HCISPP exam - contains only what you need to pass the test, and no fluff! Completely aligned with the six Common Body of Knowledge domains on the exam, walking you step by step through understanding each domain and successfully answering the exam questions. Optimize your study guide with this straightforward approach - understand the key objectives and the way test questions are structured.

Defensive Security Handbook

Defensive Security Handbook
  • Author : Lee Brotherston,Amanda Berlin
  • Publisher :Unknown
  • Release Date :2017-04-03
  • Total pages :284
  • ISBN : 9781491960332
GET BOOK HERE

Summary : Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring

The Security Risk Assessment Handbook

The Security Risk Assessment Handbook
  • Author : Douglas J. Landoll,Douglas Landoll
  • Publisher :Unknown
  • Release Date :2005-12-12
  • Total pages :504
  • ISBN : 9781420031232
GET BOOK HERE

Summary : The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-wor

Laboratory Biosecurity Handbook

Laboratory Biosecurity Handbook
  • Author : Reynolds M. Salerno,Jennifer Gaudioso,Benjamin H. Brodsky
  • Publisher :Unknown
  • Release Date :2007-06-21
  • Total pages :208
  • ISBN : 1420006207
GET BOOK HERE

Summary : By achieving a delicate balance between systems and practices, proper laboratory biosecurity reduces the risk of legitimate bioscience facilities becoming sources of pathogens and toxins for malicious use. Effective design and implementation of laboratory biosecurity depends on cooperation among individuals from diverse communities, including scientists, technicians, policy makers, security engineers, and law enforcement officials. Providing guidance to the broad international community, Laboratory Biosecurity Handbook addresses the objectives of biosecurity and the ways in which they overlap or conflict with those of biosafety. The book describes the risks of working with dangerous pathogens and toxins in the current era of international terrorism. The authors characterize the global spread of legitimate biotechnology and relate it to the rise of transnational terrorism, emphasizing the need for biosecurity measures even in legitimate bioscience. The book discusses biosecurity risk assessment-a practical methodology that allows laboratory management and biosafety/biosecurity officers to analyze and determine the level of risk, and serves as a basis for managing those risks. The book includes questionnaires that can assist the process of collecting data for a biosecurity vulnerability assessment, example standard operating procedures and memoranda of understanding, and other useful reference material. Addressing a variety of operating environments and the particular challenges they face when designing and implementing laboratory biosecurity, this book can assist bioscience facilities ranging from the large to the small, from those that focus on diagnosis or vaccine development, to those only minimally involved with infectious diseases. The detailed recommendations help avoid a "one-size-fits-all" approach to security and save limited resources. The book shows institutions how to develop and implement a biosecurity plan, and helps ensure that all components are included in the overall system, whether existing or new.

Ten Steps to a Results-Based Monitoring and Evaluation System

Ten Steps to a Results-Based Monitoring and Evaluation System
  • Author : Jody Zall Kusek,Ray C. Rist
  • Publisher :Unknown
  • Release Date :2004-06-15
  • Total pages :264
  • ISBN : 9780821389072
GET BOOK HERE

Summary : This Handbook provides a comprehensive ten-step model that will help guide development practitioners through the process of designing and building a results-based monitoring and evaluation system.

Handbook on Measurement, Assessment, and Evaluation in Higher Education

Handbook on Measurement, Assessment, and Evaluation in Higher Education
  • Author : Charles Secolsky,D. Brian Denison
  • Publisher :Unknown
  • Release Date :2017-07-31
  • Total pages :738
  • ISBN : 9781317485544
GET BOOK HERE

Summary : In this valuable resource, well-known scholars present a detailed understanding of contemporary theories and practices in the fields of measurement, assessment, and evaluation, with guidance on how to apply these ideas for the benefit of students and institutions. Bringing together terminology, analytical perspectives, and methodological advances, this second edition facilitates informed decision-making while connecting the latest thinking in these methodological areas with actual practice in higher education. This research handbook provides higher education administrators, student affairs personnel, institutional researchers, and faculty with an integrated volume of theory, method, and application.

The Web Application Hacker's Handbook

The Web Application Hacker's Handbook
  • Author : Dafydd Stuttard,Marcus Pinto
  • Publisher :Unknown
  • Release Date :2011-03-16
  • Total pages :768
  • ISBN : 9781118079614
GET BOOK HERE

Summary : This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

Handbook on Impact Evaluation

Handbook on Impact Evaluation
  • Author : Shahidur R. Khandker,Gayatri B. Koolwal,Hussain A. Samad
  • Publisher :Unknown
  • Release Date :2009-10-13
  • Total pages :260
  • ISBN : 082138029X
GET BOOK HERE

Summary : Public programs are designed to reach certain goals and beneficiaries. Methods to understand whether such programs actually work, as well as the level and nature of impacts on intended beneficiaries, are main themes of this book.

Handbook of Test Development

Handbook of Test Development
  • Author : Suzanne Lane,Mark R. Raymond,Thomas M. Haladyna
  • Publisher :Unknown
  • Release Date :2015-10-08
  • Total pages :676
  • ISBN : 9781136242564
GET BOOK HERE

Summary : The second edition of the Handbook of Test Development provides graduate students and professionals with an up-to-date, research-oriented guide to the latest developments in the field. Including thirty-two chapters by well-known scholars and practitioners, it is divided into five sections, covering the foundations of test development, content definition, item development, test design and form assembly, and the processes of test administration, documentation, and evaluation. Keenly aware of developments in the field since the publication of the first edition, including changes in technology, the evolution of psychometric theory, and the increased demands for effective tests via educational policy, the editors of this edition include new chapters on assessing noncognitive skills, measuring growth and learning progressions, automated item generation and test assembly, and computerized scoring of constructed responses. The volume also includes expanded coverage of performance testing, validity, fairness, and numerous other topics. Edited by Suzanne Lane, Mark R. Raymond, and Thomas M. Haladyna, The Handbook of Test Development, 2nd edition, is based on the revised Standards for Educational and Psychological Testing, and is appropriate for graduate courses and seminars that deal with test development and usage, professional testing services and credentialing agencies, state and local boards of education, and academic libraries serving these groups.