Official (ISC)[superscript 2] guide to the CAP CBK
There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements,...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press
2012.
Boca Raton : 2013. |
Edición: | 2nd ed |
Colección: | (ISC)2 Press series.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627703906719 |
Tabla de Contenidos:
- ch. 1. Security authorization of information systems
- ch. 2. Information system categorization
- ch. 3. Establishment of the security control baseline
- ch. 4. Application of security controls
- ch. 5. Assessment of security controls
- ch. 6. Information system authorization
- ch. 7. Security controls monitoring
- ch. 8. System authorization case study
- ch. 9. The future of information system authorization.