Bültmann & Gerriets
The It Regulatory and Standards Compliance Handbook
How to Survive Information Systems Audit and Assessments
von Craig S Wright
Verlag: Elsevier Science
Hardcover
ISBN: 978-1-59749-266-9
Erschienen am 01.06.2008
Sprache: Englisch
Format: 233 mm [H] x 193 mm [B] x 39 mm [T]
Gewicht: 1275 Gramm
Umfang: 750 Seiten

Preis: 74,50 €
keine Versandkosten (Inland)


Jetzt bestellen und voraussichtlich ab dem 22. Oktober in der Buchhandlung abholen.

Der Versand innerhalb der Stadt erfolgt in Regel am gleichen Tag.
Der Versand nach außerhalb dauert mit Post/DHL meistens 1-2 Tage.

74,50 €
merken
zum E-Book (EPUB) 55,95 €
klimaneutral
Der Verlag produziert nach eigener Angabe noch nicht klimaneutral bzw. kompensiert die CO2-Emissionen aus der Produktion nicht. Daher übernehmen wir diese Kompensation durch finanzielle Förderung entsprechender Projekte. Mehr Details finden Sie in unserer Klimabilanz.
Klappentext
Inhaltsverzeichnis

* The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them * The most comprehensive IT compliance template available * A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement * Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book * This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues.



Chapter 1 - Introduction
Chapter 2 - Evolution of Information Systems
Chapter 3 - The Information Systems Audit Program
Chapter 4 - Planning
Chapter 5 - Information Gathering
Chapter 6 - Security Policy Overview
Chapter 7 - Policy Issues and fundamentals
Chapter 8 - Assessing Security
Chapter 9 - An Introduction to Network Audit
Chapter 10 - Audting  Cisco Router and Switches
Chapter 11 - Testing the Firewall
Chapter 12 - Auditing and Security with Wireless Technologies
Chapter 13 - Analyzing the Results
Chapter 14 - An Introduction to Systems Auditing
Chapter 15 - Database Auditing
Chapter 16 - Microsoft Windows Security and Audits
Chapter 17 - Auditing UNIX and Linux
Chapter 18 - Auditing Web-Based Applications
Chapter 19 - Other Systems
Chapter 20 - Risk Management, Security Compliance, and Audit Controls
Chapter 21 - Information Systems Legislation
Chapter 22 - Operations Secuirty


andere Formate