Recommended Links:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
 
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 8: Line 8:
:[[Frequently Asked Questions (FAQ):|'''Frequently Asked Questions (FAQ)''']]<br>
:[[Frequently Asked Questions (FAQ):|'''Frequently Asked Questions (FAQ)''']]<br>
:Frequently asked questions and answers about security-related topics.<br>
:Frequently asked questions and answers about security-related topics.<br>
<br>
:[[Laws_and_Regulations:|'''Laws and Regulations''']]<br>
:Links to a partial listing of USA, European, and United Kingdom governmental laws and regulations that have, or will have, a significant effect on data processing and information security. Important industry sector regulations have also been included when they have a significant impact on information security.<br>
<br>
:[[Information_Security_Standards_Sources:|'''Sources of Information Security Standards''']]<br>
:Links to some international sites that provide many of the information security standards we should be familiar with.<br>
<br>
<br>

Latest revision as of 14:09, 8 March 2007

Recommended Links

Books
Pointers to informative books on information security.


Cyberterrorism Resources
Links to public resources regarding cyberterrorism.


Frequently Asked Questions (FAQ)
Frequently asked questions and answers about security-related topics.


Laws and Regulations
Links to a partial listing of USA, European, and United Kingdom governmental laws and regulations that have, or will have, a significant effect on data processing and information security. Important industry sector regulations have also been included when they have a significant impact on information security.


Sources of Information Security Standards
Links to some international sites that provide many of the information security standards we should be familiar with.