Search Books
Some Assembly Required: Ass… Reinforcement Learning and …

Official (ISC)2® Guide to the CAP® CBK®, Second Edition ((ISC)2 Press)

Author Patrick D. Howard
Publisher Auerbach Publications
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
80.25 80.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $76.89

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN1439820759
ISBN-139781439820759
AvailabilityUsually ships in 24 hours
Sales Rank247,200
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP ) Common Body of Knowledge (CBK ) and NIST SP 800-37, the Official (ISC)2 Guide to the CAP CBK , Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes.

Derived from the author sdecades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book:

  • Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria
  • Explains how to combine disparate processes into a unified risk management methodology
  • Covers all the topics included in the Certified Authorization Professional (CAP ) Common Body of Knowledge (CBK )
  • Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS
  • Reviews the tasks involved in certifying and accrediting U.S. government information systems

Chapters 1 through 7 describe each of the domains of the (ISC)2 CAP CBK . This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your IT systems.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View