Sold Out
Book Categories |
Ch. 1 | Introduction | 1 |
Ch. 2 | Evolution of information security | 5 |
Ch. 3 | The information security program and how a security assessment fits in | 45 |
Ch. 4 | Planning | 67 |
Ch. 5 | Initial information gathering | 103 |
Ch. 6 | Business process evaluation | 139 |
Ch. 7 | Technology evaluation | 165 |
Ch. 8 | Risk analysis and final presentation | 193 |
Ch. 9 | Information security standards | 229 |
Ch. 10 | Information security legislation | 245 |
App. A | Preliminary checklist to gather information | 259 |
App. B | Generic questionnaire for meetings with business process owners | 271 |
App. C | Generic questionnaire for meetings with technology owners | 277 |
App. D | Data classification | 283 |
App. E | Data retention | 291 |
App. F | Backup and recovery | 297 |
App. G | Externally hosted services | 309 |
App. H | Physical security | 325 |
App. I | Employee termination | 343 |
App. J | Incident handling | 351 |
App. K | Business to business (B2B) | 361 |
App. L | Business to consumer (B2C) | 371 |
App. M | Change management | 385 |
App. N | User ID administration | 391 |
App. O | Managed security | 403 |
App. P | Media handling | 415 |
App. Q | HIPAA security | 423 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionA Practical Guide to Security Assessments
X
This Item is in Your InventoryA Practical Guide to Security Assessments
X
You must be logged in to review the productsX
X
X
Add A Practical Guide to Security Assessments, , A Practical Guide to Security Assessments to the inventory that you are selling on WonderClubX
X
Add A Practical Guide to Security Assessments, , A Practical Guide to Security Assessments to your collection on WonderClub |