Official (ISC)² guide to the CAP CBK / Patrick D. Howard.
نوع المادة : نصالسلاسل:(iSC)2 Press seriesالناشر:Boca Raton : Auerbach Publications, [2013]تاريخ حقوق النشر: copyright 2013الطبعات:2nd edوصف:xxxi, 430 pages ; 27 cmنوع المحتوى:- text
- unmediated
- volume
- 9781439820759 (hbk)
- Official ISC2 guide to the CAP CBK
- Official (ISC)² to the Certified authorization professional CBK
- Computer networks -- Security measures -- Examinations -- Study guides
- Computers -- Access control -- Examinations -- Study guides
- Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides
- Telecommunications engineers -- United States -- Certification
- TK5105.59 H673 2013
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 H673 2013 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011076560 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 H673 2013 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011076559 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5105.59 .H3533 2012 Handbook on securing cyber-physical critical infrastructure : foundation and challenges / | TK5105.59 .H3533 2012 Handbook on securing cyber-physical critical infrastructure : foundation and challenges / | TK5105.59 H673 2013 Official (ISC)² guide to the CAP CBK / | TK5105.59 H673 2013 Official (ISC)² guide to the CAP CBK / | TK5105.59 I537 2004 International guide to cyber security / | TK5105.59 I537 2004 International guide to cyber security / | TK5105.59 I546 1998 InfoWar : information.macht.krieg |
Includes index.
"Providing an overview of certification and accreditation, the second edition of this officially sanctioned guide demonstrates the practicality and effectiveness of C&A as a risk management methodology for IT systems in public and private organizations. It enables readers to document the status of their security controls and learn how to secure IT systems via standard, repeatable processes. The text describes what it takes to build a certification and accreditation program at the organization level and then analyzes various C&A processes and how they interrelate. A case study illustrates the successful implementation of certification and accreditation in a major U.S. government department. The appendices offer a collection of helpful samples"-- Provided by publisher.
"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements, the process developed and presented can be used by nongovernment organizations to address compliance and the myriad laws, regulations, and standards currently driving information technology security. The key to reaching system authorization nirvana is understanding what is required and then implementing a methodology that will achieve those requirements. The top-down methodology presented in this book provides the reader with a practical approach for completion of such an undertaking. By demystifying government requirements, this book presents a simplified, practical approach to system authorization"-- Provided by publisher.