Cargando…

Official (ISC)2 guide to the CAP CBK /

"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirem...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Howard, Patrick D.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, 2012.
Edición:2nd ed.
Colección:(ISC)2 Press series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn808342552
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 120319s2012 flua ob 001 0 eng d
010 |z  2012004044 
040 |a E7B  |b eng  |e pn  |c E7B  |d DEBBG  |d OCLCO  |d UMI  |d OCLCQ  |d CRCPR  |d EBLCP  |d OCLCO  |d COO  |d OCLCQ  |d OCLCO  |d IDB  |d MERUC  |d OCLCQ  |d OCLCF  |d OCLCQ  |d LOA  |d OCLCQ  |d U3W  |d LVT  |d S2H  |d ELBRO  |d OCLCO  |d OCLCQ 
019 |a 904445306  |a 908077197  |a 1122512840  |a 1135520715  |a 1152696306  |a 1280139185  |a 1287177969 
020 |a 9781439820766  |q (e-book) 
020 |a 1439820767 
020 |a 9781439820766 
020 |a 9781466576032 
020 |a 1466576030 
020 |a 9781466576018 
020 |a 1466576014 
020 |a 1439820759 
020 |a 9781439820759 
020 |z 9781439820759 
029 1 |a AU@  |b 000055825845 
029 1 |a DEBBG  |b BV040885268 
029 1 |a DEBBG  |b BV042682743 
035 |a (OCoLC)808342552  |z (OCoLC)904445306  |z (OCoLC)908077197  |z (OCoLC)1122512840  |z (OCoLC)1135520715  |z (OCoLC)1152696306  |z (OCoLC)1280139185  |z (OCoLC)1287177969 
037 |a CL0500000565  |b Safari Books Online 
043 |a n-us--- 
050 4 |a TK5105.59  |b .H673 2012eb 
082 0 4 |a 658.4/78076  |2 23 
049 |a UAMI 
100 1 |a Howard, Patrick D. 
245 1 0 |a Official (ISC)2 guide to the CAP CBK /  |c Patrick D. Howard. 
246 3 0 |a Official ISC2 guide to the CAP CBK 
246 3 |a Official (ISC)2 to the Certified authorization professional CBK 
250 |a 2nd ed. 
260 |a Boca Raton :  |b CRC Press,  |c 2012. 
300 |a 1 online resource (xxxi, 417 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a (ISC)2 Press series 
500 |a "An Auerbach book." 
520 |a "There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements, the process developed and presented can be used by nongovernment organizations to address compliance and the myriad laws, regulations, and standards currently driving information technology security. The key to reaching system authorization nirvana is understanding what is required and then implementing a methodology that will achieve those requirements. The top-down methodology presented in this book provides the reader with a practical approach for completion of such an undertaking. By demystifying government requirements, this book presents a simplified, practical approach to system authorization"--  |c Provided by publisher. 
504 |a Includes bibliographical references and index. 
505 0 |a Ch. 1. Security authorization of information systems -- ch. 2. Information system categorization -- ch. 3. Establishment of the security control baseline -- ch. 4. Application of security controls -- ch. 5. Assessment of security controls -- ch. 6. Information system authorization -- ch. 7. Security controls monitoring -- ch. 8. System authorization case study -- ch. 9. The future of information system authorization. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Computers  |x Access control  |x Examinations  |v Study guides. 
650 0 |a Administrative agencies  |x Information resources management  |x Security measures  |z United States  |x Examinations  |v Study guides. 
650 0 |a Telecommunications engineers  |x Certification  |z United States. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle  |x Examens  |v Guides de l'étudiant. 
650 6 |a Administration publique  |x Gestion de l'information  |z États-Unis  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer networks  |x Security measures  |x Examinations.  |2 fast  |0 (OCoLC)fst00872343 
650 7 |a Telecommunications engineers  |x Certification.  |2 fast  |0 (OCoLC)fst01146096 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
776 0 |z 9781439820759 
776 0 |z 9781439820766 
830 0 |a (ISC)2 Press series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439820759/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a CRC Press  |b CRCP  |n AUP0KE10978PDF 
938 |a EBL - Ebook Library  |b EBLB  |n EBL981531 
938 |a ebrary  |b EBRY  |n ebr10582668 
938 |a eLibro  |b ELBO  |n ELB142761 
994 |a 92  |b IZTAP