Auditing Your Security Infrastructure

Table of contents:

Need to Know More?

www.jebcl.com/riskdo/riskdo.htm Risk assessment do's and don'ts

www.usatoday.com/money/jobcenter/workplace/recruiting/2002-11-20-legal_x.htm Keeping pre-employment checks legal

http://library.lp.findlaw.com/articles/file/00334/002357/title/Subject/topic/Employment%20Law_At-will%20Employment/filename/employmentlaw_1_454 Self-audits of employment practices

http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/sld001.htm Building effective security policies

http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci1033304,00.html Ten traits of effective policy

www.sans.org/resources/policies/ Policy templates and information

www.itl.nist.gov/lab/bulletns/bltnoct03.htm Building an effective security-awareness program

www.computerworld.com/careertopics/careers/training/story/0,10801,54375,00.html Methods to build effective security awareness

www.microsoft.com/technet/security/topics/policiesandprocedures/secrisk/srsgch02.mspx Risk-management guide

The CISSP Cram Sheet

A Note from Series Editor Ed Tittel

About the Author


We Want to Hear from You!



The CISSP Certification Exam

Physical Security

Security-Management Practices

Access-Control Systems and Methodology

System Architecture and Models

Telecommunications and Network Security

Applications and Systems-Development Security

Operations Security

Business Continuity Planning

Law, Investigations, and Ethics


Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2

CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg

Similar book on Amazon

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net