The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Artikelnr. des Verlages: B978-1-59749-266-9.X0001-X
Seitenzahl: 750
Erscheinungstermin: 1. Juni 2008
Englisch
Abmessung: 233mm x 193mm x 39mm
Gewicht: 1284g
ISBN-13: 9781597492669
ISBN-10: 1597492663
Artikelnr.: 23494739
Herstellerkennzeichnung
Libri GmbH
Europaallee 1
36244 Bad Hersfeld
06621 890
Inhaltsangabe
Chapter 1 - Introduction Chapter 2 - Evolution of Information Systems Chapter 3 - The Information Systems Audit Program Chapter 4 - Planning Chapter 5 - Information Gathering Chapter 6 - Security Policy Overview Chapter 7 - Policy Issues and fundamentals Chapter 8 - Assessing Security Chapter 9 - An Introduction to Network Audit Chapter 10 - Audting Cisco Router and Switches Chapter 11 - Testing the Firewall Chapter 12 - Auditing and Security with Wireless Technologies Chapter 13 - Analyzing the Results Chapter 14 - An Introduction to Systems Auditing Chapter 15 - Database Auditing Chapter 16 - Microsoft Windows Security and Audits Chapter 17 - Auditing UNIX and Linux Chapter 18 - Auditing Web-Based Applications Chapter 19 - Other Systems Chapter 20 - Risk Management, Security Compliance, and Audit Controls Chapter 21 - Information Systems Legislation Chapter 22 - Operations Secuirty
Chapter 1 - Introduction Chapter 2 - Evolution of Information Systems Chapter 3 - The Information Systems Audit Program Chapter 4 - Planning Chapter 5 - Information Gathering Chapter 6 - Security Policy Overview Chapter 7 - Policy Issues and fundamentals Chapter 8 - Assessing Security Chapter 9 - An Introduction to Network Audit Chapter 10 - Audting Cisco Router and Switches Chapter 11 - Testing the Firewall Chapter 12 - Auditing and Security with Wireless Technologies Chapter 13 - Analyzing the Results Chapter 14 - An Introduction to Systems Auditing Chapter 15 - Database Auditing Chapter 16 - Microsoft Windows Security and Audits Chapter 17 - Auditing UNIX and Linux Chapter 18 - Auditing Web-Based Applications Chapter 19 - Other Systems Chapter 20 - Risk Management, Security Compliance, and Audit Controls Chapter 21 - Information Systems Legislation Chapter 22 - Operations Secuirty
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826