Official (ISC)2 guide to the CAP CBK /
"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirem...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press,
2012.
|
Edición: | 2nd ed. |
Colección: | (ISC)2 Press series.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Tabla de Contenidos:
- Ch. 1. Security authorization of information systems
- ch. 2. Information system categorization
- ch. 3. Establishment of the security control baseline
- ch. 4. Application of security controls
- ch. 5. Assessment of security controls
- ch. 6. Information system authorization
- ch. 7. Security controls monitoring
- ch. 8. System authorization case study
- ch. 9. The future of information system authorization.