Home Page Icon
Home Page
Table of Contents for
Back cover
Close
Back cover
by Sudhanshu Kairab
A Practical Guide to Security Assessments
Front cover
About the Author
Preface
Table of Contents (1/2)
Table of Contents (2/2)
Chapter 1. Introduction
Chapter 2. Evolution of Information Security (1/8)
Chapter 2. Evolution of Information Security (2/8)
Chapter 2. Evolution of Information Security (3/8)
Chapter 2. Evolution of Information Security (4/8)
Chapter 2. Evolution of Information Security (5/8)
Chapter 2. Evolution of Information Security (6/8)
Chapter 2. Evolution of Information Security (7/8)
Chapter 2. Evolution of Information Security (8/8)
Chapter 3. The Information Security Program and How a Security Assessment Fits In (1/5)
Chapter 3. The Information Security Program and How a Security Assessment Fits In (2/5)
Chapter 3. The Information Security Program and How a Security Assessment Fits In (3/5)
Chapter 3. The Information Security Program and How a Security Assessment Fits In (4/5)
Chapter 3. The Information Security Program and How a Security Assessment Fits In (5/5)
Chapter 4. Planning (1/8)
Chapter 4. Planning (2/8)
Chapter 4. Planning (3/8)
Chapter 4. Planning (4/8)
Chapter 4. Planning (5/8)
Chapter 4. Planning (6/8)
Chapter 4. Planning (7/8)
Chapter 4. Planning (8/8)
Chapter 5. Initial Information Gathering (1/8)
Chapter 5. Initial Information Gathering (2/8)
Chapter 5. Initial Information Gathering (3/8)
Chapter 5. Initial Information Gathering (4/8)
Chapter 5. Initial Information Gathering (5/8)
Chapter 5. Initial Information Gathering (6/8)
Chapter 5. Initial Information Gathering (7/8)
Chapter 5. Initial Information Gathering (8/8)
Chapter 6. Business Process Evaluation (1/6)
Chapter 6. Business Process Evaluation (2/6)
Chapter 6. Business Process Evaluation (3/6)
Chapter 6. Business Process Evaluation (4/6)
Chapter 6. Business Process Evaluation (5/6)
Chapter 6. Business Process Evaluation (6/6)
Chapter 7. Technology Evaluation (1/6)
Chapter 7. Technology Evaluation (2/6)
Chapter 7. Technology Evaluation (3/6)
Chapter 7. Technology Evaluation (4/6)
Chapter 7. Technology Evaluation (5/6)
Chapter 7. Technology Evaluation (6/6)
Chapter 8. Risk Analysis and Final Presentation (1/8)
Chapter 8. Risk Analysis and Final Presentation (2/8)
Chapter 8. Risk Analysis and Final Presentation (3/8)
Chapter 8. Risk Analysis and Final Presentation (4/8)
Chapter 8. Risk Analysis and Final Presentation (5/8)
Chapter 8. Risk Analysis and Final Presentation (6/8)
Chapter 8. Risk Analysis and Final Presentation (7/8)
Chapter 8. Risk Analysis and Final Presentation (8/8)
Chapter 9. Information Security Standards (1/4)
Chapter 9. Information Security Standards (2/4)
Chapter 9. Information Security Standards (3/4)
Chapter 9. Information Security Standards (4/4)
Chapter 10. Information Security Legislation (1/2)
Chapter 10. Information Security Legislation (2/2)
Security Questionnaires and Checklists
Appendices: Security Questionnaires and Checklists
Appendix A: Preliminary Checklist to Gather Information (1/3)
Appendix A: Preliminary Checklist to Gather Information (2/3)
Appendix A: Preliminary Checklist to Gather Information (3/3)
Appendix B: Generic Questionnaire for Meetings with Business Process Owners (1/2)
Appendix B: Generic Questionnaire for Meetings with Business Process Owners (2/2)
Appendix C: Generic Questionnaire for Meetings with Technology Owners (1/2)
Appendix C: Generic Questionnaire for Meetings with Technology Owners (2/2)
Appendix D: Data Classification (1/2)
Appendix D: Data Classification (2/2)
Appendix E: Data Retention (1/2)
Appendix E: Data Retention (2/2)
Appendix F: Backup and Recovery (1/3)
Appendix F: Backup and Recovery (2/3)
Appendix F: Backup and Recovery (3/3)
Appendix G: Externally Hosted Services (1/4)
Appendix G: Externally Hosted Services (2/4)
Appendix G: Externally Hosted Services (3/4)
Appendix G: Externally Hosted Services (4/4)
Appendix H: Physical Security (1/4)
Appendix H: Physical Security (2/4)
Appendix H: Physical Security (3/4)
Appendix H: Physical Security (4/4)
Appendix I: Employee Termination (1/2)
Appendix I: Employee Termination (2/2)
Appendix J: Incident Handling (1/2)
Appendix J: Incident Handling (2/2)
Appendix K: Business to Business (B2B) (1/2)
Appendix K: Business to Business (B2B) (2/2)
Appendix L: Business to Consumer (B2C) (1/3)
Appendix L: Business to Consumer (B2C) (2/3)
Appendix L: Business to Consumer (B2C) (3/3)
Appendix M: Change Management (1/2)
Appendix M: Change Management (2/2)
Appendix N: User ID Administration (1/3)
Appendix N: User ID Administration (2/3)
Appendix N: User ID Administration (3/3)
Appendix O: Managed Security (1/3)
Appendix O: Managed Security (2/3)
Appendix O: Managed Security (3/3)
Appendix P: Media Handling (1/2)
Appendix P: Media Handling (2/2)
Appendix Q: HIPAA Security (1/13)
Appendix Q: HIPAA Security (2/13)
Appendix Q: HIPAA Security (3/13)
Appendix Q: HIPAA Security (4/13)
Appendix Q: HIPAA Security (5/13)
Appendix Q: HIPAA Security (6/13)
Appendix Q: HIPAA Security (7/13)
Appendix Q: HIPAA Security (8/13)
Appendix Q: HIPAA Security (9/13)
Appendix Q: HIPAA Security (10/13)
Appendix Q: HIPAA Security (11/13)
Appendix Q: HIPAA Security (12/13)
Appendix Q: HIPAA Security (13/13)
Index (1/3)
Index (2/3)
Index (3/3)
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index (3/3)
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset