LEADER 00000cam a2200793Ma 4500 001 808342552 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cn||||||||| 008 120319s2012 flua ob 001 0 eng d 010 |z 2012004044 019 904445306|a908077197|a1122512840|a1135520715|a1152696306 |a1280139185|a1287177969 020 9781439820766|q(e-book) 020 1439820767 020 9781439820766 020 9781466576032 020 1466576030 020 9781466576018 020 1466576014 020 1439820759 020 9781439820759 029 1 AU@|b000055825845 029 1 DEBBG|bBV040885268 029 1 DEBBG|bBV042682743 035 (OCoLC)808342552|z(OCoLC)904445306|z(OCoLC)908077197 |z(OCoLC)1122512840|z(OCoLC)1135520715|z(OCoLC)1152696306 |z(OCoLC)1280139185|z(OCoLC)1287177969 037 CL0500000565|bSafari Books Online 040 E7B|beng|epn|cE7B|dDEBBG|dOCLCO|dUMI|dOCLCQ|dCRCPR|dEBLCP |dOCLCO|dCOO|dOCLCQ|dOCLCO|dIDB|dMERUC|dOCLCQ|dOCLCF |dOCLCQ|dLOA|dOCLCQ|dU3W|dLVT|dS2H|dELBRO|dOCLCO|dOCLCQ |dOCLCO|dOCLCL 043 n-us--- 049 INap 082 04 658.4/78076 082 04 658.4/78076|223 099 eBook O’Reilly for Public Libraries 100 1 Howard, Patrick D. 245 10 Official (ISC)2 guide to the CAP CBK /|cPatrick D. Howard. |h[O'Reilly electronic resource] 246 3 Official (ISC)2 to the Certified authorization professional CBK 246 30 Official ISC2 guide to the CAP CBK 250 2nd ed. 260 Boca Raton :|bCRC Press,|c2012. 300 1 online resource (xxxi, 417 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 data file|2rda 490 1 (ISC)2 Press series 500 "An Auerbach book." 504 Includes bibliographical references and index. 505 0 Ch. 1. Security authorization of information systems -- ch. 2. Information system categorization -- ch. 3. Establishment of the security control baseline -- ch. 4. Application of security controls -- ch. 5. Assessment of security controls -- ch. 6. Information system authorization -- ch. 7. Security controls monitoring -- ch. 8. System authorization case study -- ch. 9. The future of information system authorization. 520 "There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements, the process developed and presented can be used by nongovernment organizations to address compliance and the myriad laws, regulations, and standards currently driving information technology security. The key to reaching system authorization nirvana is understanding what is required and then implementing a methodology that will achieve those requirements. The top-down methodology presented in this book provides the reader with a practical approach for completion of such an undertaking. By demystifying government requirements, this book presents a simplified, practical approach to system authorization"--|cProvided by publisher. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer networks|xSecurity measures|xExaminations|vStudy guides. 650 0 Computers|xAccess control|xExaminations|vStudy guides. 650 0 Administrative agencies|xInformation resources management |xSecurity measures|zUnited States|xExaminations|vStudy guides. 650 0 Telecommunications engineers|xCertification|zUnited States. 650 6 Réseaux d'ordinateurs|xSécurité|xMesures|xExamens|vGuides de l'étudiant. 650 6 Ordinateurs|xAccès|xContrôle|xExamens|vGuides de l'étudiant. 650 6 Administration publique|xGestion de l'information|zÉtats- Unis|xSécurité|xMesures|xExamens|vGuides de l'étudiant. 650 7 Computer networks|xSecurity measures|xExaminations|2fast 650 7 Telecommunications engineers|xCertification|2fast 651 7 United States|2fast|1https://id.oclc.org/worldcat/entity/ E39PBJtxgQXMWqmjMjjwXRHgrq 655 7 Study guides|2fast 776 0 |z9781439820759 776 0 |z9781439820766 830 0 (ISC)2 Press series. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781439820759/?ar |zAvailable on O'Reilly for Public Libraries 938 CRC Press|bCRCP|nAUP0KE10978PDF 938 EBL - Ebook Library|bEBLB|nEBL981531 938 ebrary|bEBRY|nebr10582668 938 eLibro|bELBO|nELB142761 994 92|bJFN