Security Controls for Sarbanes-Oxley Section 404 IT Compl... and over 2 million other books are available for Amazon Kindle . Learn more

Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Start reading Security Controls for Sarbanes-Oxley Section 404 IT Compl... on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access [Paperback]

Dennis C. Brewer


Available from these sellers.


Formats

Amazon Price New from Used from
Kindle Edition 26.36  
Paperback --  

Book Description

25 Oct 2005 0764598384 978-0764598388
  • The Sarbanes–Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets–all of which depend heavily on installing or improving information security technology
  • Offers an in–depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security
  • Addresses the critical concepts and skills necessary to design and create a system that integrates identity management, meta–directories, identity provisioning, authentication, and access control
  • A companion book to Manager′s Guide to the Sarbanes–Oxley Act (0–471–56975–5) and How to Comply with Sarbanes–Oxley Section 404 (0–471–65366–7)

Product details


More About the Author

Discover books, learn about writers, and more.

Product Description

From the Back Cover

Your step–by–step guide to creating authentication processes that assure compliance

To comply with Sarbanes–Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that, explaining what you need to know every step of the way.

  • Recognize eight concepts that constitute privacy of information
  • Apply the security basics—identification, authentication, authorization, access control, administration, auditing, and assessment
  • Use features already present in directory technology, directory schema, and meta–synchronization to improve security profiles
  • Integrate a security architecture into legacy, current, and future applications
  • Create security domain definitions that will stop data predators cold

About the Author

Dennis C. Brewer is IT Security Solutions Specialist for the Information Technology Department of the State of Michigan. His responsibilities include identity management and privacy protection initiatives for the state.

Inside This Book (Learn More)
First Sentence
How many laws and regulations affect your business? Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback