WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/119963088

The IT Regulatory and Standards Compliance Handbook How to Survive Information Systems Audit and Assessments

This technically-based, practical guide presents a methodology to enable the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs.

Open All Close All

http://schema.org/about

http://schema.org/alternateName

  • "IT regulatory and standards compliance handbook"

http://schema.org/description

  • "This technically-based, practical guide presents a methodology to enable the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs."@en
  • "Offers a comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs."@en
  • "This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs. Key Features: * The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them * The most comprehensive IT compliance template available, giving detailed information on testing all your IT security, policy and governance requirements * A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement * Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book * This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues."@en
  • "This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs. Key Features: * The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them * The most comprehensive IT compliance template available, giving detailed information on testing all your IT security, policy and governance requirements * A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement * Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book * This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues."
  • "This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs. This is the ultimate guide to making an effective security policy and controls that enable monitoring and testing against them. It is the most comprehensive IT compliance template available, giving detailed information on testing all your IT security, policy and governance requirements. It is a guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement. Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book. This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues."@en

http://schema.org/genre

  • "Electronic books"
  • "Electronic books"@en
  • "Livres électroniques"
  • "Llibres electrònics"

http://schema.org/name

  • "The IT Regulatory and Standards Compliance Handbook How to Survive Information Systems Audit and Assessments"@en
  • "The IT regulatory and standards compliance handbook [how to survive an information systems audit and assessments]"@en
  • "The IT Regulatory and Standards Compliance Handbook"@en
  • "The IT regulatory and standards compliance handbook"@en
  • "The IT regulatory and standards compliance handbook"
  • "The IT regulatory and standards compliance handbook how to survive information systems audit and assessments"
  • "The IT regulatory and standards compliance handbook how to survive information systems audit and assessments"@en
  • "The IT regulatory and standards compliance handbook "How to survive an information systems audit and assessments"--Cover"