|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910164016103321 |
|
|
Autore |
Weiss Martin (Martin M.) |
|
|
Titolo |
Auditing IT infrastructures for compliance / / Marty M. Weiss and Michael G. Solomon |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2016 |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[Second edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (458 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
Jones & Bartlett Learning Information Systems Security & Assurance Series |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer networks - Security measures |
Compliance auditing |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
The need for information systems security compliance -- Overview of U.S. compliance laws -- What is the scope of an IT compliance audit? -- Auditing standards and frameworks -- Planning an IT infrastructure audit for compliance -- Conducting an IT infrastructure audit for compliance -- Writing the IT infrastructure audit report -- Compliance within the user domain -- Compliance within the workstation domain -- Compliance within the LAN domain -- Compliance within the LAN-to-WAN domain -- Compliance within the WAn domain -- Compliance within the remote access domain -- Compliance within the system/application domain -- Ethics, education, and certification for IT auditors. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing. |
|
|
|
|