"This comprehensive text provides readers with a proven approach to establishing successful enterprise security certification and accreditation programs. It presents an integrated methodology for performing C A processes based on the numerous government references currently available. The book also states the case for using C A to identify and implement security controls for government and private sector systems. The text provides nuts-and-bolds guidance on performing C A tasks through a detailed examination of processes and through the use of case studies." |