Sarbanes-Oxley IT Compliance Using Open Source Tools

Sarbanes-Oxley IT Compliance Using Open Source Tools
Title Sarbanes-Oxley IT Compliance Using Open Source Tools PDF eBook
Author Christian B Lahti
Publisher Elsevier
Pages 466
Release 2007-12-19
Genre Computers
ISBN 0080557279

Download Sarbanes-Oxley IT Compliance Using Open Source Tools Book in PDF, Epub and Kindle

The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals, including those affecting Enron, Arthur Andersen, and WorldCom. The law is named after Senator Paul Sarbanes and Representative Michael G. Oxley. It was approved by the House by a vote of 423-3 and by the Senate 99-0. This book illustrates the many Open Source cost-saving opportunities that public companies can explore in their IT enterprise to meet mandatory compliance requirements of the Sarbanes-Oxley act. This book will also demonstrate by example and technical reference both the infrastructure components for Open Source that can be made compliant, and the Open Source tools that can aid in the journey of compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion. The format of the book will begin each chapter with the IT business and executive considerations of Open Source and SOX compliance. The remaining chapter verbiage will include specific examinations of Open Source applications and tools which relate to the given subject matter. * Only book that shows companies how to use Open Source tools to achieve SOX compliance, which dramatically lowers the cost of using proprietary, commercial applications. * Only SOX compliance book specifically detailing steps to achieve SOX compliance for IT Professionals.

Sarbanes-Oxley Compliance Using COBIT and Open Source Tools

Sarbanes-Oxley Compliance Using COBIT and Open Source Tools
Title Sarbanes-Oxley Compliance Using COBIT and Open Source Tools PDF eBook
Author Christian B Lahti
Publisher Elsevier
Pages 360
Release 2005-10-07
Genre Computers
ISBN 0080489672

Download Sarbanes-Oxley Compliance Using COBIT and Open Source Tools Book in PDF, Epub and Kindle

This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly documents which Open Source tools you should consider using in the journey towards compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion.Each chapter begins with an analysis of the business and technical ramifications of Sarbanes-Oxley as regards to topics covered before moving into the detailed instructions on the use of the various Open Source applications and tools relating to the compliance objectives. - Shows companies how to use Open Source tools to achieve SOX compliance, which dramatically lowers the cost of using proprietary, commercial applications - Only SOX compliance book specifically detailing steps to achieve SOX compliance for IT Professionals

CIO

CIO
Title CIO PDF eBook
Author
Publisher
Pages 90
Release 2005-11-15
Genre
ISBN

Download CIO Book in PDF, Epub and Kindle

Computerworld

Computerworld
Title Computerworld PDF eBook
Author
Publisher
Pages 56
Release 2003-11-03
Genre
ISBN

Download Computerworld Book in PDF, Epub and Kindle

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.

Information Security The Complete Reference, Second Edition

Information Security The Complete Reference, Second Edition
Title Information Security The Complete Reference, Second Edition PDF eBook
Author Mark Rhodes-Ousley
Publisher McGraw Hill Professional
Pages 898
Release 2013-04-03
Genre Computers
ISBN 0071784357

Download Information Security The Complete Reference, Second Edition Book in PDF, Epub and Kindle

Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike. Understand security concepts and building blocks Identify vulnerabilities and mitigate risk Optimize authentication and authorization Use IRM and encryption to protect unstructured data Defend storage devices, databases, and software Protect network routers, switches, and firewalls Secure VPN, wireless, VoIP, and PBX infrastructure Design intrusion detection and prevention systems Develop secure Windows, Java, and mobile applications Perform incident response and forensic analysis

Computerworld

Computerworld
Title Computerworld PDF eBook
Author
Publisher
Pages 64
Release 2005-10-24
Genre
ISBN

Download Computerworld Book in PDF, Epub and Kindle

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.

Software Development

Software Development
Title Software Development PDF eBook
Author
Publisher
Pages 316
Release 2006
Genre Computer software
ISBN

Download Software Development Book in PDF, Epub and Kindle