Items related to Security Controls for Sarbanes-Oxley Section 404 IT...

Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access

3.33 avg rating
( 3 ratings by Goodreads )
 
9780764598388: Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
View all copies of this ISBN edition:
 
 

  • The Sarbanes–Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets–all of which depend heavily on installing or improving information security technology
  • Offers an in–depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security
  • Addresses the critical concepts and skills necessary to design and create a system that integrates identity management, meta–directories, identity provisioning, authentication, and access control
  • A companion book to Manager′s Guide to the Sarbanes–Oxley Act (0–471–56975–5) and How to Comply with Sarbanes–Oxley Section 404 (0–471–65366–7)

"synopsis" may belong to another edition of this title.

From the Back Cover:

Your step–by–step guide to creating authentication processes that assure compliance

To comply with Sarbanes–Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that, explaining what you need to know every step of the way.

  • Recognize eight concepts that constitute privacy of information
  • Apply the security basics identification, authentication, authorization, access control, administration, auditing, and assessment
  • Use features already present in directory technology, directory schema, and meta–synchronization to improve security profiles
  • Integrate a security architecture into legacy, current, and future applications
  • Create security domain definitions that will stop data predators cold

About the Author:

Dennis C. Brewer is IT Security Solutions Specialist for the Information Technology Department of the State of Michigan. His responsibilities include identity management and privacy protection initiatives for the state.

"About this title" may belong to another edition of this title.

Buy Used
Gut/Very good: Buch bzw. Schutzumschlag... Learn more about this copy

Shipping: 5.17
From Germany to U.S.A.

Destination, rates & speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

Stock Image

Brewer, Dennis C.
Published by Wiley (2005)
ISBN 10: 0764598384 ISBN 13: 9780764598388
Used Softcover Quantity: 1
Seller:
medimops
(Berlin, Germany)

Book Description Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Seller Inventory # M00764598384-V

More information about this seller | Contact this seller

Buy Used
44.40
Convert currency

Add to Basket

Shipping: 5.17
From Germany to U.S.A.
Destination, rates & speeds
Stock Image

Brewer, Dennis C.
Published by Wiley (2005)
ISBN 10: 0764598384 ISBN 13: 9780764598388
Used Softcover Quantity: 1
Seller:
Read&Dream
(SAINT LOUIS, MO, U.S.A.)

Book Description Condition: Good. All pages and cover are intact - The book may have some cosmetic wear (i.e. creased spine/cover, scratches, curled corners, folded pages, minor sunburn) - The book has very few or no highlight/notes/underlined pages - Safe and Secure Mailer - No Hassle Return - Used books may not include supplementary material. Seller Inventory # 4JSMVK000MBE

More information about this seller | Contact this seller

Buy Used
83.64
Convert currency

Add to Basket

Shipping: 3.30
Within U.S.A.
Destination, rates & speeds