๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Sarbanes-Oxley IT Compliance Using Open Source Tools

โœ Scribed by Christian B. Lahti and Roderick Peterson (Auth.)


Publisher
Syngress
Year
2007
Tongue
English
Leaves
440
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Content:
Lead Authors, Page V
Contributing Authors, Pages VI-VIII
Chapter 1 - Overview โ€ The Goals of This Book, Pages 1-34
Chapter 2 - Introduction to the Companion DVD, Pages 35-72
Chapter 3 - SOX and Compliance Regulations, Pages 73-95
Chapter 4 - What's In a Framework?, Pages 97-125
Chapter 5 - The Cost of Compliance, Pages 127-166
Chapter 6 - What's First?, Pages 167-213
Chapter 7 - What's Second, Pages 215-261
Chapter 8 - Are We There Yet?, Pages 263-323
Chapter 9 - Finally, We've Arrived, Pages 325-375
Chapter 10 - Putting It All Together, Pages 377-393
Appendix A - COBIT Control Objectives, Pages 395-407
Appendix B - ITIL Framework Summary, Pages 409-416
Appendix C - GNU General Public Licenses, Pages 417-435
Index, Pages 437-445


๐Ÿ“œ SIMILAR VOLUMES


Sarbanes-Oxley IT Compliance Using COBIT
โœ Christian Lahti, Roderick Peterson, Steve Lanza ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Syngress ๐ŸŒ English

The Sarbanes-Oxley Act affects everyone in the finance or IT departments of publicly traded or pre-IPO companies who must spend much time and money figuring out how to comply. This book/CD-ROM package is not intended as a how-to manual for passing audits, but it does integrate information about the

Sarbanes-Oxley Compliance Using COBIT an
โœ Christian Lahti, Roderick Peterson ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Syngress ๐ŸŒ English

This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly documents which Open Source tool

Risk Management Solutions for Sarbanes-O
โœ John S. Quarterman ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Wiley ๐ŸŒ English

<ul><li>Examines how risk management security technologies must prevent virus and computer attacks, as well as providing insurance and processes for natural disasters such as fire, floods, tsunamis, terrorist attacks<li>Addresses four main topics: the risk (severity, extent, origins, complications,