Official (ISC)2 guide to the CAP CBK /

"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirem...

Descripción completa

Detalles Bibliográficos
Autor principal: Howard, Patrick D.
Formato: Libro electrónico
Lenguaje:Inglés
Publicado: Boca Raton : CRC Press, 2012.
Edición:2nd ed.
Colección:(ISC)2 Press series.
Materias:
Acceso en línea:https://elibro.net/ereader/ufasta/142761
Aporte de:Registro referencial: Solicitar el recurso aquí
LEADER 02652nam a2200445 a 4500
001 ELB142761
003 FINmELB
005 20241227141558.0
006 m o d |
007 cr cn|||||||||
008 120319s2012 flua s 000 0 eng d
020 |z 9781439820759 
020 |z 9781439820766 (e-book) 
035 |a (OCoLC)1280139185 
040 |a FINmELB  |c FINmELB  |d FINmELB 
043 |a n-us--- 
050 4 |a TK5105.59  |b .H673 2012 
082 0 4 |a 658.4/78076  |2 23 
100 1 |a Howard, Patrick D. 
245 1 0 |a Official (ISC)2 guide to the CAP CBK /  |c Patrick D. Howard. 
246 3 0 |a Official ISC2 guide to the CAP CBK 
246 3 |a Official (ISC)2 to the Certified authorization professional CBK 
250 |a 2nd ed. 
260 |a Boca Raton :  |b CRC Press,  |c 2012. 
300 |a xxxi, 417 p. :  |b ill. 
490 1 |a (ISC)2 Press series 
500 |a "An Auerbach book." 
520 |a "There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements, the process developed and presented can be used by nongovernment organizations to address compliance and the myriad laws, regulations, and standards currently driving information technology security. The key to reaching system authorization nirvana is understanding what is required and then implementing a methodology that will achieve those requirements. The top-down methodology presented in this book provides the reader with a practical approach for completion of such an undertaking. By demystifying government requirements, this book presents a simplified, practical approach to system authorization"--  |c Provided by publisher. 
588 |a Description based on metadata supplied by the publisher and other sources. 
590 |a Electronic reproduction. Santa Fe, Arg.: elibro, 2020. Available via World Wide Web. Access may be limited to eLibro affiliated libraries. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Computers  |x Access control  |x Examinations  |v Study guides. 
650 0 |a Administrative agencies  |x Information resources management  |x Security measures  |z United States  |x Examinations  |v Study guides. 
650 0 |a Telecommunications engineers  |x Certification  |z United States. 
655 4 |a Electronic books. 
797 2 |a elibro, Corp. 
830 0 |a (ISC)2 Press series. 
856 4 0 |u https://elibro.net/ereader/ufasta/142761 
950 |a eLibro English 
999 |c 183883  |d 183883