Critical Threads 2006: IT*Security
Lulu.com, 2006 - 130 pages
The publisher and editors of IT*Security Magazine, the nation's first professional journal of IT*Security and Critical Infrastructure Protection, bring you the top experts and essays of 2005-2006.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Not Ready for Compliance Prime Time
Importance of a Structured Incident Response Process
When U S Businesses Cooperate With the
Phishing and Internet Identity Theft
Audits and Security Policy Management
access control anti-virus applications assertions ATCA attacks audit and compliance Authentication assurance best practices certificate communication company’s compliance solution consumers corporate court credentials assurance credentials verifier critical cryptographic customers database denial-of-service attacks devices digital signature digitally sign e-mail employees encryption Enron ensure environments event data extraordinary rendition federated IdM FIdPPS firewall Gramm-Leach-Bliley Act hackers hardware HIPAA identify IDENTITY ASSURANCE LEVELS identity theft IdPs implemented incident response individual industry infrastructure Internet intrusion detection systems investigation issues messages monitoring MyDoom network security policy organization’s organizations passwords patch personal information phishing plaintiff problems protected protocols RDBMS relying parties reports risk security breach security incidents Security Policy Document server Sinaltrainal spam spyware standards storage Stored Communications Act Supp system administrators system security policies threats today’s torture trust TTPs TVPA unauthorized Unocal users vendor vulnerability worm