Chapter 18

Ten Essential Security References

In This Chapter

arrow Framework for Improving Critical Infrastructure Cybersecurity

arrow Cloud Controls Matrix (CCM)

arrow Unified Compliance Framework (UCF)

arrow ISO27001

arrow Open Web Application Security Project (OWASP)

arrow Center for Internet Security(CIS)

arrow Common Vulnerabilities and Exposures (CVE)

arrow COBIT 5 Toolkit

arrow U.S. and International Technology Laws

arrow Top 125 Network Security Tools


Information security professionals are successful not because of what they ...

Get Getting an Information Security Job For Dummies now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.