Official (ISC)2 guide to the CAP CBK /
"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirem...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Boca Raton :
CRC Press,
2012.
|
Édition: | 2nd ed. |
Collection: | (ISC)2 Press series.
|
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Table des matières:
- Ch. 1. Security authorization of information systems
- ch. 2. Information system categorization
- ch. 3. Establishment of the security control baseline
- ch. 4. Application of security controls
- ch. 5. Assessment of security controls
- ch. 6. Information system authorization
- ch. 7. Security controls monitoring
- ch. 8. System authorization case study
- ch. 9. The future of information system authorization.