Chargement en cours…

Official (ISC)2 guide to the CAP CBK /

"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirem...

Description complète

Détails bibliographiques
Cote:Libro Electrónico
Auteur principal: Howard, Patrick D.
Format: Électronique eBook
Langue:Inglés
Publié: Boca Raton : CRC Press, 2012.
Édition:2nd ed.
Collection:(ISC)2 Press series.
Sujets:
Accès en ligne:Texto completo (Requiere registro previo con correo institucional)
Table des matières:
  • Ch. 1. Security authorization of information systems
  • ch. 2. Information system categorization
  • ch. 3. Establishment of the security control baseline
  • ch. 4. Application of security controls
  • ch. 5. Assessment of security controls
  • ch. 6. Information system authorization
  • ch. 7. Security controls monitoring
  • ch. 8. System authorization case study
  • ch. 9. The future of information system authorization.