Security Controls for Sarbanes-Oxley Section 404 IT Compl... and over one million other books are available for Amazon Kindle. Learn more
  • List Price: CDN$ 54.99
  • You Save: CDN$ 11.00 (20%)
Usually ships within 2 to 4 weeks.
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Security Controls for Sar... has been added to your Cart
Used: Good | Details
Sold by bay_city_books
Condition: Used: Good
Comment: Ships from the USA! Expected delivery 7-14 days GOOD with average wear to cover and pages. We offer a no-hassle guarantee on all our items. Orders generally ship by the next business day. Default Text
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access Paperback – Oct 21 2005


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 43.99
CDN$ 43.70 CDN$ 7.08

Best Books of 2014
Unruly Places, Alastair Bonnett’s tour of the world’s most unlikely micro-nations, moving villages, secret cities, and no man’s lands, is our #1 pick for 2014. See all


Product Details


Product Description

From the Back Cover

Your step-by-step guide to creating authentication processes that assure compliance

To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that, explaining what you need to know every step of the way.

  • Recognize eight concepts that constitute privacy of information
  • Apply the security basics—identification, authentication, authorization, access control, administration, auditing, and assessment
  • Use features already present in directory technology, directory schema, and meta-synchronization to improve security profiles
  • Integrate a security architecture into legacy, current, and future applications
  • Create security domain definitions that will stop data predators cold

About the Author

Dennis C. Brewer is IT Security Solutions Specialist for the Information Technology Department of the State of Michigan. His responsibilities include identity management and privacy protection initiatives for the state.

Inside This Book (Learn More)
First Sentence
How many laws and regulations affect your business? Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star

Look for similar items by category


Feedback

Would you like to update product info or give feedback on images?