Chapter 1 - Introduction
Chapter 2 - Evolution of Information Systems
Chapter 3 - The Information Systems Audit Program
Chapter 4 - Planning
Chapter 5 - Information Gathering
Chapter 6 - Security Policy Overview
Chapter 7 - Policy Issues and fundamentals
Chapter 8 - Assessing Security
Chapter 9 - An Introduction to Network Audit
Chapter 10 - Audting Cisco Router and Switches
Chapter 11 - Testing the Firewall
Chapter 12 - Auditing and Security with Wireless Technologies
Chapter 13 - Analyzing the Results
Chapter 14 - An Introduction to Systems Auditing
Chapter 15 - Database Auditing
Chapter 16 - Microsoft Windows Security and Audits
Chapter 17 - Auditing UNIX and Linux
Chapter 18 - Auditing Web-Based Applications
Chapter 19 - Other Systems
Chapter 20 - Risk Management, Security Compliance, and Audit Controls
Chapter 21 - Information Systems Legislation
Chapter 22 - Operations Secuirty
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.