Scene of the Cybercrime, Second Edition
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...
BizTalk 2010 EDI for Health Care: HIPAA Compliant 837 Solutions
Building a successful health care claims processing EDI implementation in BizTalk Server can be complex. Decisions must be made around how to extract and publish data, how to map to the 837 EDI standard, and how to appropriately batch and deliver data. If architected properly, your BizTalk solution can be highly efficient, simple, and...
HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)
Written for the IT staff in hospitals, this guide provides step-by-step direction on how to apply the required and addressable HIPAA Security implementation specifications into a comprehensive solution.
A “consensus project” of numerous computer security experts has culminated in a Guide for...
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...
|Result Page: 3 2 1 |