Recommended Links:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 12: Line 12:
:Links to a partial listing of USA, European, and United Kingdom governmental laws and regulations that have, or will have, a significant effect on data processing and information security. Important industry sector regulations have also been included when they have a significant impact on information security.<br>
:Links to a partial listing of USA, European, and United Kingdom governmental laws and regulations that have, or will have, a significant effect on data processing and information security. Important industry sector regulations have also been included when they have a significant impact on information security.<br>
<br>
<br>
:[[Information_Security_Standards_Sources Sources of Information Security Standards''']]<br>
:[[Information_Security_Standards_Sources:|'''Sources of Information Security Standards''']]<br>
:Links to some international sites that provide many of the information security standards we should be familiar with.<br>
:Links to some international sites that provide many of the information security standards we should be familiar with.<br>
<br>
<br>

Latest revision as of 14:09, 8 March 2007

Recommended Links

Books
Pointers to informative books on information security.


Cyberterrorism Resources
Links to public resources regarding cyberterrorism.


Frequently Asked Questions (FAQ)
Frequently asked questions and answers about security-related topics.


Laws and Regulations
Links to a partial listing of USA, European, and United Kingdom governmental laws and regulations that have, or will have, a significant effect on data processing and information security. Important industry sector regulations have also been included when they have a significant impact on information security.


Sources of Information Security Standards
Links to some international sites that provide many of the information security standards we should be familiar with.