Chapter 8
Security and Compliance
If you don't like their rules, whose would you use?
Charlie Brown
Chapter table of contents
8.1 How We Got Here
8.3 Security Solutions and Technologies
8.4 Types of Threats
8.6 The Rules
8.7 How to Comply with the Rules
8.8 Hidden Benefits of Compliance
8.9 Methodologies and Frameworks
8.10 It's Not Just Regulatory Compliance
8.11 Further References
(In)security is everywhere. Security is a critical component of an IT Manager's life. Almost every decision he makes will have to be evaluated at some point for its security implications. Hiring a new programmer? How much access should that person have? Installing a new server? Who is allowed to access it? Making sure ...
Get IT Manager's Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.