Sold Out
Book Categories |
Ch. 1 | The role of information technology architecture in information systems design | 1 |
Ch. 2 | Understanding basic concepts of privacy and data protection | 19 |
Ch. 3 | Defining and enforcing architecture | 35 |
Ch. 4 | Combining external forces, internal influences, and IT assets | 67 |
Ch. 5 | Simplifying the security matrix | 83 |
Ch. 6 | Developing directory-based access control strategies | 109 |
Ch. 7 | Integrating the critical elements | 127 |
Ch. 8 | Engineering privacy protection into systems and applications | 143 |
Ch. 9 | The value of data inventory and data labeling | 157 |
Ch. 10 | Putting it all together in the Web applications environment | 165 |
Ch. 11 | Why federated identity schemes fail | 181 |
Ch. 12 | A pathway to universal two-factor authentication | 189 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
X
This Item is in Your InventorySecurity Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
X
You must be logged in to review the productsX
X
X
Add
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access,
X
X
Add
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access,
|