|
title
|
author
|
my rating
|
shelves
|
date started
|
date finished
|
added by
|
date added
|
|
 |
Security Metrics: Replacing Fear, Uncertainty, and Doubt
|
Jaquith, Andrew
|
|
read,
1-metrics-and-str...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Implementing the HIPAA Security Standard: Securing the Electronic Exchange of Information in an E-Health Environment: Journal of Healthcare ... Single Issue Health Care Information MGMT)
|
Jones, Russell L.
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
The Payment Card Industry Data Security Standard V2.0 Compliance Policy (Writing Information Security Policies Book 26)
|
Inskeep, Chris
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology
|
National Institute of Standards
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Implementing the ISO/IEC 27001 Information Security Management System Standard
|
Humphreys, Edward
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Security Guide for Interconnecting Information Systems: Recommendations of the National Institute of Standards and Technology
|
Grance, Tim
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Managing HIPAA Compliance: Standards For Electronic Transmission, Privacy, And Security Of Health Information
|
Withrow, Scott C.
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security
|
Bowen, Pauline
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Guide for Assessing the Security Controls in Federal Information Systems and Organizations
|
National Institute of Standards
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Assurance Directorate: NSA Community Gold Standard Technical Guidanc
|
Agency, National Security
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security: Dictionary of Concepts, Standards and Terms
|
Longley, Dennis
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security: Dictionary of Standard Concepts and Terms
|
Longley, Dennis
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security Law
|
Smedinghoff, Thomas
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security Policies, Procedures, and Standards: A Practitioner's Reference
|
Landoll, Douglas J.
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
NIST Special Publication 800-53 Information Security
|
National Institute of Standards
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
NIST: Guide to Information Technology Security Services
|
National Institute of Standards
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Recommended Security Controls for Federal Information Systems and Organizations
|
National Institute of Standards
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Implementing the ISO/IEC 27001 Information Security Management System Standard
|
Humphreys, Edward
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Open Information Security Management Maturity Model (O-ISM3) (The Open Group Standards)
|
Open Group, The
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Handbook of Information Security: Key Concepts, Infrastructure, Standards And Protocols
|
Bidgoli, Hossein
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
|
Williams, Barry L.
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Technical security standard for information technology
|
Police, Royal Canadian Mounted
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security Law: The Emerging Standard for Corporate Compliance
|
Smedinghoff, Thomas J.
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Information Security Policies, Procedures, and Standards
|
Peltier, Thomas R.
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Providing Assurance to Cloud Computing through ISO 27001 Certification: How Much Cloud is Secured After Implementing Information Security Standards
|
Tariq, Muhammad Imran
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
National Security and China's Information Security Standards: Of Shoes, Buttons, and Routers
|
Ahrens, Nathaniel
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|
 |
Handbook for information security: A guide towards information security standards
|
Aalders, J.C.H.
|
|
to-read,
2-policy-and-comp...
|
|
|
deleted user
|
2017/01/17 |
view activity »
|