Buy Used
CDN$ 20.58
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: Shipped from the US -- Expect delivery in 1-2 weeks. Shows some signs of wear, and may have some markings on the inside. 100% Money Back Guarantee. Shipped to over one million happy customers. Your purchase benefits world literacy!
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access Paperback – Oct 21 2005


See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 312.16 CDN$ 20.58

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.




Product Details

  • Paperback: 262 pages
  • Publisher: Wiley; 1 edition (Oct. 21 2005)
  • Language: English
  • ISBN-10: 0764598384
  • ISBN-13: 978-0764598388
  • Product Dimensions: 18.9 x 1.6 x 23.4 cm
  • Shipping Weight: 431 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #3,170,015 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From the Back Cover

Your step-by-step guide to creating authentication processes that assure compliance

To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that, explaining what you need to know every step of the way.

  • Recognize eight concepts that constitute privacy of information
  • Apply the security basics—identification, authentication, authorization, access control, administration, auditing, and assessment
  • Use features already present in directory technology, directory schema, and meta-synchronization to improve security profiles
  • Integrate a security architecture into legacy, current, and future applications
  • Create security domain definitions that will stop data predators cold

About the Author

Dennis C. Brewer is IT Security Solutions Specialist for the Information Technology Department of the State of Michigan. His responsibilities include identity management and privacy protection initiatives for the state.

Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star


Feedback