Fr. 60.50

The IT Regulatory and Standards Compliance Handbook - How to Survive Information Systems Audit and Assessments

Inglese · Tascabile

Spedizione di solito entro 1 a 3 settimane (non disponibile a breve termine)

Descrizione

Ulteriori informazioni

Klappentext * The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them * The most comprehensive IT compliance template available * A guide to meeting the minimum standard! whether you are planning to meet ISO 27001! PCI-DSS! HIPPA! FISCAM! COBIT or any other IT compliance requirement * Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge! skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book * This technically based! practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues. Zusammenfassung Presents a comprehensive methodology! enabling the staff charged with an IT security audit to create a sound framework! allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This book helps in making an effective security policy and controls that enable monitoring and testing against them. Inhaltsverzeichnis Chapter 1 - Introduction Chapter 2 - Evolution of Information Systems Chapter 3 - The Information Systems Audit Program Chapter 4 - Planning Chapter 5 - Information Gathering Chapter 6 - Security Policy Overview Chapter 7 - Policy Issues and fundamentals Chapter 8 - Assessing Security Chapter 9 - An Introduction to Network Audit Chapter 10 - Audting  Cisco Router and Switches Chapter 11 - Testing the Firewall Chapter 12 - Auditing and Security with Wireless Technologies Chapter 13 - Analyzing the Results Chapter 14 - An Introduction to Systems Auditing Chapter 15 - Database Auditing Chapter 16 - Microsoft Windows Security and Audits Chapter 17 - Auditing UNIX and Linux Chapter 18 - Auditing Web-Based Applications Chapter 19 - Other Systems Chapter 20 - Risk Management, Security Compliance, and Audit Controls Chapter 21 - Information Systems Legislation Chapter 22 - Operations Secuirty ...

Sommario

Chapter 1 - Introduction
Chapter 2 - Evolution of Information Systems
Chapter 3 - The Information Systems Audit Program
Chapter 4 - Planning
Chapter 5 - Information Gathering
Chapter 6 - Security Policy Overview
Chapter 7 - Policy Issues and fundamentals
Chapter 8 - Assessing Security
Chapter 9 - An Introduction to Network Audit
Chapter 10 - Audting Cisco Router and Switches
Chapter 11 - Testing the Firewall
Chapter 12 - Auditing and Security with Wireless Technologies
Chapter 13 - Analyzing the Results
Chapter 14 - An Introduction to Systems Auditing
Chapter 15 - Database Auditing
Chapter 16 - Microsoft Windows Security and Audits
Chapter 17 - Auditing UNIX and Linux
Chapter 18 - Auditing Web-Based Applications
Chapter 19 - Other Systems
Chapter 20 - Risk Management, Security Compliance, and Audit Controls
Chapter 21 - Information Systems Legislation
Chapter 22 - Operations Secuirty

Dettagli sul prodotto

Autori Brian Freedman, Dale Liu, WRIGHT, Craig Wright, Craig S Wright, Craig S. Wright, Craig/ Freedman Wright
Editore ELSEVIER SCIENCE BV
 
Lingue Inglese
Formato Tascabile
Pubblicazione 20.06.2008
 
EAN 9781597492669
ISBN 978-1-59749-266-9
Pagine 715
Dimensioni 184 mm x 229 mm x 38 mm
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica
Scienze sociali, diritto, economia > Economia > Tematiche generali, enciclopedie

Computersicherheit, Qualitätsmanagement, Informationstechnik, Informationstechnologie IT

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.