Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200793Ma 4500 
001    808342552 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cn||||||||| 
008    120319s2012    flua    ob    001 0 eng d 
010    |z  2012004044 
019    904445306|a908077197|a1122512840|a1135520715|a1152696306
       |a1280139185|a1287177969 
020    9781439820766|q(e-book) 
020    1439820767 
020    9781439820766 
020    9781466576032 
020    1466576030 
020    9781466576018 
020    1466576014 
020    1439820759 
020    9781439820759 
029 1  AU@|b000055825845 
029 1  DEBBG|bBV040885268 
029 1  DEBBG|bBV042682743 
035    (OCoLC)808342552|z(OCoLC)904445306|z(OCoLC)908077197
       |z(OCoLC)1122512840|z(OCoLC)1135520715|z(OCoLC)1152696306
       |z(OCoLC)1280139185|z(OCoLC)1287177969 
037    CL0500000565|bSafari Books Online 
040    E7B|beng|epn|cE7B|dDEBBG|dOCLCO|dUMI|dOCLCQ|dCRCPR|dEBLCP
       |dOCLCO|dCOO|dOCLCQ|dOCLCO|dIDB|dMERUC|dOCLCQ|dOCLCF
       |dOCLCQ|dLOA|dOCLCQ|dU3W|dLVT|dS2H|dELBRO|dOCLCO|dOCLCQ
       |dOCLCO|dOCLCL 
043    n-us--- 
049    INap 
082 04 658.4/78076 
082 04 658.4/78076|223 
099    eBook O’Reilly for Public Libraries 
100 1  Howard, Patrick D. 
245 10 Official (ISC)2 guide to the CAP CBK /|cPatrick D. Howard.
       |h[O'Reilly electronic resource] 
246 3  Official (ISC)2 to the Certified authorization 
       professional CBK 
246 30 Official ISC2 guide to the CAP CBK 
250    2nd ed. 
260    Boca Raton :|bCRC Press,|c2012. 
300    1 online resource (xxxi, 417 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    data file|2rda 
490 1  (ISC)2 Press series 
500    "An Auerbach book." 
504    Includes bibliographical references and index. 
505 0  Ch. 1. Security authorization of information systems -- 
       ch. 2. Information system categorization -- ch. 3. 
       Establishment of the security control baseline -- ch. 4. 
       Application of security controls -- ch. 5. Assessment of 
       security controls -- ch. 6. Information system 
       authorization -- ch. 7. Security controls monitoring -- 
       ch. 8. System authorization case study -- ch. 9. The 
       future of information system authorization. 
520    "There are many elements that make system authorization 
       complex. This book focuses on the processes that must be 
       employed by an organization to establish a system 
       authorization program based on current federal government 
       criteria. Although the roots of this book address various 
       federal requirements, the process developed and presented 
       can be used by nongovernment organizations to address 
       compliance and the myriad laws, regulations, and standards
       currently driving information technology security. The key
       to reaching system authorization nirvana is understanding 
       what is required and then implementing a methodology that 
       will achieve those requirements. The top-down methodology 
       presented in this book provides the reader with a 
       practical approach for completion of such an undertaking. 
       By demystifying government requirements, this book 
       presents a simplified, practical approach to system 
       authorization"--|cProvided by publisher. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer networks|xSecurity measures|xExaminations|vStudy 
       guides. 
650  0 Computers|xAccess control|xExaminations|vStudy guides. 
650  0 Administrative agencies|xInformation resources management
       |xSecurity measures|zUnited States|xExaminations|vStudy 
       guides. 
650  0 Telecommunications engineers|xCertification|zUnited 
       States. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures|xExamens|vGuides 
       de l'étudiant. 
650  6 Ordinateurs|xAccès|xContrôle|xExamens|vGuides de 
       l'étudiant. 
650  6 Administration publique|xGestion de l'information|zÉtats-
       Unis|xSécurité|xMesures|xExamens|vGuides de l'étudiant. 
650  7 Computer networks|xSecurity measures|xExaminations|2fast 
650  7 Telecommunications engineers|xCertification|2fast 
651  7 United States|2fast|1https://id.oclc.org/worldcat/entity/
       E39PBJtxgQXMWqmjMjjwXRHgrq 
655  7 Study guides|2fast 
776 0  |z9781439820759 
776 0  |z9781439820766 
830  0 (ISC)2 Press series. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781439820759/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    CRC Press|bCRCP|nAUP0KE10978PDF 
938    EBL - Ebook Library|bEBLB|nEBL981531 
938    ebrary|bEBRY|nebr10582668 
938    eLibro|bELBO|nELB142761 
994    92|bJFN