Use coupon code “SUMMER20” for a 20% discount on all items! Valid until 2024-08-31

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      Official (ISC)2® Guide to the CAP® CBK®

      1 in stock

      Firm sale: non returnable item
      SKU 9781439820759 Categories ,
      Select Guide Rating
      Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public and private organizations. This work provides security professionals with an overview of C&A components, showing them how to document the status of IT se...

      £69.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781439820759
      Product Form:Hardback
      Country of Manufacture:US
      Series:ISC2 Press
      Title:Official (ISC)2® Guide to the CAP® CBK®
      Authors:Author: Patrick D. Howard
      Page Count:462
      Subjects:Computer security, Computer security
      Description:Select Guide Rating
      Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public and private organizations. This work provides security professionals with an overview of C&A components, showing them how to document the status of IT security controls and secure systems via standard, repeatable processes.

      Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP®) Common Body of Knowledge (CBK®) and NIST SP 800-37, the Official (ISC) Guide to the CAP® CBK®, Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes.

      Derived from the author’s decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation’s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book:

      • Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria
      • Explains how to combine disparate processes into a unified risk management methodology
      • Covers all the topics included in the Certified Authorization Professional (CAP®) Common Body of Knowledge (CBK®)
      • Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS
      • Reviews the tasks involved in certifying and accrediting U.S. government information systems

      Chapters 1 through 7 describe each of the domains of the (ISC) CAP® CBK®. This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book’s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your IT systems.


      Imprint Name:Taylor & Francis Inc
      Publisher Name:Taylor & Francis Inc
      Country of Publication:GB
      Publishing Date:2012-07-18

      Additional information

      Weight978 g
      Dimensions261 × 184 × 29 mm