Only group members can add books.

group shelves

all (27)
read (1)
to-read (26)


view: main | covers


Showing 1-27 of 27
  title author my rating shelves date started date finished added by date added Down arrow  
Security Metrics by Andrew Jaquith Security Metrics: Replacing Fear, Uncertainty, and Doubt Jaquith, Andrew read, 1-metrics-and-str...     deleted user 2017/01/17 view activity »
Implementing the HIPAA Security Standard by Russell L. Jones Implementing the HIPAA Security Standard: Securing the Electronic Exchange of Information in an E-Health Environment: Journal of Healthcare ... Single Issue Health Care Information MGMT) Jones, Russell L. to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
The Payment Card Industry Data Security Standard V2.0 Complia... by Chris Inskeep The Payment Card Industry Data Security Standard V2.0 Compliance Policy (Writing Information Security Policies Book 26) Inskeep, Chris to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Technical Guide to Information Security Testing and Assessment by National Institute of Stand... Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology National Institute of Standards to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Implementing the ISO/IEC 27001 Information Security Managemen... by Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard Humphreys, Edward to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Security Guide for Interconnecting Information Systems by Tim Grance Security Guide for Interconnecting Information Systems: Recommendations of the National Institute of Standards and Technology Grance, Tim to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Managing HIPAA Compliance by Scott C. Withrow Managing HIPAA Compliance: Standards For Electronic Transmission, Privacy, And Security Of Health Information Withrow, Scott C. to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security Handbook by Pauline Bowen Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security Bowen, Pauline to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Guide for Assessing the Security Controls in Federal Informat... by National Institute of Stand... Guide for Assessing the Security Controls in Federal Information Systems and Organizations National Institute of Standards to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Assurance Directorate by National Security Agency Information Assurance Directorate: NSA Community Gold Standard Technical Guidanc Agency, National Security to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security by Dennis Longley Information Security: Dictionary of Concepts, Standards and Terms Longley, Dennis to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security by Dennis Longley Information Security: Dictionary of Standard Concepts and Terms Longley, Dennis to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security Law by Thomas Smedinghoff Information Security Law Smedinghoff, Thomas to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security Policies, Procedures, and Standards by Douglas J. Landoll Information Security Policies, Procedures, and Standards: A Practitioner's Reference Landoll, Douglas J. to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
NIST Special Publication 800-53 Information Security by National Institute of Stand... NIST Special Publication 800-53 Information Security National Institute of Standards to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
NIST by National Institute of Stand... NIST: Guide to Information Technology Security Services National Institute of Standards to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Recommended Security Controls for Federal Information Systems... by National Institute of Stand... Recommended Security Controls for Federal Information Systems and Organizations National Institute of Standards to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Implementing the ISO/IEC 27001 Information Security Managemen... by Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard Humphreys, Edward to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Open Information Security Management Maturity Model (O-ISM3) by The Open Group Open Information Security Management Maturity Model (O-ISM3) (The Open Group Standards) Open Group, The to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Handbook of Information Security by Hossein Bidgoli Handbook of Information Security: Key Concepts, Infrastructure, Standards And Protocols Bidgoli, Hossein to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security Policy Development for Compliance by Barry L. Williams Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 Williams, Barry L. to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Technical security standard for information technology by Royal Canadian Mounted Police Technical security standard for information technology Police, Royal Canadian Mounted to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security Law by Thomas J. Smedinghoff Information Security Law: The Emerging Standard for Corporate Compliance Smedinghoff, Thomas J. to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Information Security Policies, Procedures, and Standards by Thomas R. Peltier Information Security Policies, Procedures, and Standards Peltier, Thomas R. to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Providing Assurance to Cloud Computing through ISO 27001 Cert... by Muhammad Imran Tariq Providing Assurance to Cloud Computing through ISO 27001 Certification: How Much Cloud is Secured After Implementing Information Security Standards Tariq, Muhammad Imran to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
National Security and China's Information Security Standards by Nathaniel Ahrens National Security and China's Information Security Standards: Of Shoes, Buttons, and Routers Ahrens, Nathaniel to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »
Handbook for information security by J.C.H. Aalders Handbook for information security: A guide towards information security standards Aalders, J.C.H. to-read, 2-policy-and-comp...     deleted user 2017/01/17 view activity »


RSS feed for group bookshelf
per page