O'Reilly logo

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies by Steven Hernandez, Corey Schou

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

APPENDIX H

References and Sources of Information

From its inception, the book has been designed so that each of the chapters are self-contained. For your convenience, all recommended readings and resources have been collected in this single location.

      • (ISC)2. www.isc2.org.

      • “Top-Down Approach for Security.” Network Magazine. Indian Express Newspapers, June 2003. www.networkmagazineindia.com/20030h6/is15.shtml.

      ACM Computing Curricula Information Technology Volume: Model Curriculum. ACM, Dec. 12, 2008. http://campus.acm.org/public/comments/it-curriculum-draft-may-2008.pdf.

      • AICPA. GAAP Codification. www.aicpa.org/InterestAreas/BusinessIndustryAndGovernment/Resources/FinancialAccountingReportingTax/DownloadableDocuments/FASB%20%20accounting%20means%20to%20CFOpdf.pdf ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required