Skip to content

Auditing IT Infrastructures for Compliance

Spend $50 to get a free DVD!

ISBN-10: 0763791814

ISBN-13: 9780763791810

Edition: 2011

Authors: kim, Michael G. Solomon, Martin Weiss

List price: $99.95
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!Information systems and IT infrastructures are no longer void from governance and compliance given recent U.S.-based compliancy laws that were consummated during the early to mid-2000s. As a result of these laws, both public sector and private sector verticals must have proper security controls in place. Auditing IT Infrastructures for Compliance identifies and explains what each of these compliancy laws requires. It then goes on to discuss how to audit an IT infrastructure for compliance based on the laws and the need to protect and secure business and consumer privacy data. It closes with a resource…    
Customers also bought

Book details

List price: $99.95
Copyright year: 2011
Publisher: Jones & Bartlett Learning, LLC
Publication date: 9/24/2010
Binding: Paperback
Pages: 384
Size: 7.00" wide x 8.75" long x 0.75" tall
Weight: 1.716
Language: English

Kalani K. Hausman, CISSP, CISA, CISM, GHSC, is Assistant Commandant for IT at Texas A and M. He has 20+ years experience in IT governance, enterprise architecture, compliance, security management, and related areas in government, higher education, healthcare, and corporate settings. He is active within FBI InfraGard, ISACA, and ISSA.Martin Weiss, Security+, CISSP, MCSE: Security, RSA CSE, manages security gurus at RSA. A director of ISSA's Connecticut chapter, he has authored several books.Diane Barrett, CISSP, ISSMP, Security+, is professor in the University of Advancing Technology's Network Security and Computer Forensics programs, and author of several security and forensic books.