LEADER 03577nmm a2200577 u 4500
001 EB001937400
003 EBX01000000000000001100302
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1439820767 
020 |a 9781439820766 
020 |a 1466576030 
020 |a 1466576014 
020 |a 9781466576032 
020 |a 9781439820766 
020 |a 1439820759 
020 |a 9781466576018 
050 4 |a TK5105.59 
100 1 |a Howard, Patrick D. 
245 0 0 |a Official (ISC)2 guide to the CAP CBK  |c Patrick D. Howard 
246 3 1 |a Official ISC2 guide to the CAP CBK 
246 3 1 |a Official (ISC)2 to the Certified authorization professional CBK 
250 |a 2nd ed 
260 |a Boca Raton  |b CRC Press  |c 2012 
300 |a xxxi, 417 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
505 0 |a Ch. 1. Security authorization of information systems -- ch. 2. Information system categorization -- ch. 3. Establishment of the security control baseline -- ch. 4. Application of security controls -- ch. 5. Assessment of security controls -- ch. 6. Information system authorization -- ch. 7. Security controls monitoring -- ch. 8. System authorization case study -- ch. 9. The future of information system authorization 
653 |a United States / fast / https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 
653 |a Computer networks / Security measures / Examinations / fast 
653 |a Administrative agencies / Information resources management / Security measures / United States / Examinations / Study guides 
653 |a Telecommunications engineers / Certification / United States 
653 |a Computer networks / Security measures / Examinations / Study guides 
653 |a Ordinateurs / Accès / Contrôle / Examens / Guides de l'étudiant 
653 |a Telecommunications engineers / Certification / fast 
653 |a Computers / Access control / Examinations / Study guides 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures / Examens / Guides de l'étudiant 
653 |a Administration publique / Gestion de l'information / États-Unis / Sécurité / Mesures / Examens / Guides de l'étudiant 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a (ISC)2 Press series 
500 |a "An Auerbach book." 
776 |z 9781439820759 
776 |z 9781439820766 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439820759/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 331 
082 0 |a 374 
082 0 |a 658 
082 0 |a 658.4/78076 
520 |a "There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements, the process developed and presented can be used by nongovernment organizations to address compliance and the myriad laws, regulations, and standards currently driving information technology security. The key to reaching system authorization nirvana is understanding what is required and then implementing a methodology that will achieve those requirements. The top-down methodology presented in this book provides the reader with a practical approach for completion of such an undertaking. By demystifying government requirements, this book presents a simplified, practical approach to system authorization"--