+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


The IT Regulatory and Standards Compliance Handbook

  • ID: 1764580
  • Book
  • July 2008
  • 750 Pages
  • Elsevier Science and Technology
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.

- The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them- The most comprehensive IT compliance template available, giving detailed information on testing all your IT security, policy and governance requirements- A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement- Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book- This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Note: Product cover images may vary from those shown
Chapter 1
Chapter 2
Evolution of Information Systems
Chapter 3
The Information Systems Audit Program
Chapter 4
Chapter 5
Information Gathering
Chapter 6
Security Policy Overview
Chapter 7
Policy Issues and fundamentals
Chapter 8
Assessing Security
Chapter 9
An Introduction to Network Audit
Chapter 10
Audting  Cisco Router and Switches
Chapter 11
Testing the Firewall
Chapter 12
Auditing and Security with Wireless Technologies
Chapter 13
Analyzing the Results
Chapter 14
An Introduction to Systems Auditing
Chapter 15
Database Auditing
Chapter 16
Microsoft Windows Security and Audits
Chapter 17
Auditing UNIX and Linux
Chapter 18
Auditing Web-Based Applications
Chapter 19
Other Systems
Chapter 20
Risk Management, Security Compliance, and Audit Controls
Chapter 21
Information Systems Legislation
Chapter 22
Operations Secuirty
Note: Product cover images may vary from those shown
Wright, Craig S.
Note: Product cover images may vary from those shown