Official (ISC)2 guide to the CAP CBK / Patrick D. Howard.

"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirem...

Full description

Saved in:
Bibliographic Details
Superior document:(ISC)2 Press series
:
TeilnehmendeR:
Year of Publication:2012
Edition:2nd ed.
Language:English
Series:(ISC)2 Press series.
Online Access:
Physical Description:xxxi, 417 p. :; ill.
Notes:"An Auerbach book."
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02747nam a2200469 a 4500
001 500981531
003 MiAaPQ
005 20200520144314.0
006 m o d |
007 cr cn|||||||||
008 120319s2012 flua s 000 0 eng d
010 |z  2012004044 
020 |z 9781439820759 
020 |a 9781439820766 (electronic bk.) 
035 |a (MiAaPQ)500981531 
035 |a (Au-PeEL)EBL981531 
035 |a (CaPaEBR)ebr10582668 
035 |a (CaONFJC)MIL693990 
035 |a (OCoLC)808342552 
040 |a MiAaPQ  |c MiAaPQ  |d MiAaPQ 
043 |a n-us--- 
050 4 |a TK5105.59  |b .H673 2012 
082 0 4 |a 658.4/78076  |2 23 
100 1 |a Howard, Patrick D. 
245 1 0 |a Official (ISC)2 guide to the CAP CBK  |h [electronic resource] /  |c Patrick D. Howard. 
246 3 0 |a Official ISC2 guide to the CAP CBK 
246 3 |a Official (ISC)2 to the Certified authorization professional CBK 
250 |a 2nd ed. 
260 |a Boca Raton :  |b CRC Press,  |c 2012. 
300 |a xxxi, 417 p. :  |b ill. 
490 1 |a (ISC)2 Press series 
500 |a "An Auerbach book." 
520 |a "There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements, the process developed and presented can be used by nongovernment organizations to address compliance and the myriad laws, regulations, and standards currently driving information technology security. The key to reaching system authorization nirvana is understanding what is required and then implementing a methodology that will achieve those requirements. The top-down methodology presented in this book provides the reader with a practical approach for completion of such an undertaking. By demystifying government requirements, this book presents a simplified, practical approach to system authorization"--  |c Provided by publisher. 
533 |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Computers  |x Access control  |x Examinations  |v Study guides. 
650 0 |a Administrative agencies  |x Information resources management  |x Security measures  |z United States  |x Examinations  |v Study guides. 
650 0 |a Telecommunications engineers  |x Certification  |z United States. 
655 4 |a Electronic books. 
710 2 |a ProQuest (Firm) 
830 0 |a (ISC)2 Press series. 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=981531  |z Click to View