The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets - all of which depend heavily on installing or improving information security technology. This work offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security. It addresses the critical concepts and skills necessary to design and create a system that integrates identity management, meta-directories, identity provisioning, authentication, and access control. This work is a companion book to "Manager's Guide to the Sarbanes-Oxley Act" (0-471-56975-5) and "How to Comply with Sarbanes-Oxley Section 404" (0-471-65366-7).
評分
評分
評分
評分
本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度,google,bing,sogou 等
© 2025 qciss.net All Rights Reserved. 小哈圖書下載中心 版权所有