APPENDIX H

References and Sources of Information

From its inception, the book has been designed so that each of the chapters are self-contained. For your convenience, all recommended readings and resources have been collected in this single location.

      • (ISC)2. www.isc2.org.

      • “Top-Down Approach for Security.” Network Magazine. Indian Express Newspapers, June 2003. www.networkmagazineindia.com/20030h6/is15.shtml.

      ACM Computing Curricula Information Technology Volume: Model Curriculum. ACM, Dec. 12, 2008. http://campus.acm.org/public/comments/it-curriculum-draft-may-2008.pdf.

      • AICPA. GAAP Codification. www.aicpa.org/InterestAreas/BusinessIndustryAndGovernment/Resources/FinancialAccountingReportingTax/DownloadableDocuments/FASB%20%20accounting%20means%20to%20CFOpdf.pdf ...

Get Information Assurance Handbook: Effective Computer Security and Risk Management Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.