Text
Access control, authentication, and public key infrastructure
Contents:
PART ONE The need for access control systems
Chapter 1 Access control framework
Chapter 2 Assessing risk and its impact on access control
Chapter 3 Business drivers for access controls
Chapter 4 Access control policies, standards, procedures, and guidelines
Chapter 5 Security Breaches and the law
PART TWO Mitigating risk with access control systems, authentication, and PKI
Chapter 6 Mapping business challenges to access control types
Chapter 7 Human nature and organizational behavior
Chapter 8 Access control for information systems
Chapter 9 Physical security and access control
Chapter 10 Access control in the enterprise
PART THREE Implementing, testing and managing access control systems
Chapter 11 Access control system implementations
Chapter 12 Access control solutions for remote workers
Chapter 13 Public key infrastructure and encryption
Chapter 14 Testing access control systems
Chapter 15 Access control assurance
Appendix A Answer key
Appendix B Standard acronyms
Glossary of key terms
References
Index
No other version available