1
by Bishop, Matt, Sullivan, Elisabeth, Ruppel, Michelle
Published 2019
Addison-Wesley
Table of Contents: ... -- Foundational Results -- Part III: Policy: Security Policies -- Confidentiality Policies -- Integrity Policies...

2
by Simmons, Ken
Published 2010
Apress
Table of Contents: ...To Policy-Based Management -- Creating Policies -- Evaluating Policies -- Policy-Based Management...

3
by Simmons, Ken, Stasiuk, Colin, Segarra, Jorge
Published 2010
Apress
Table of Contents: ...to Policy-Based Management -- Creating Policies -- Evaluating Policies -- Policy-Based Management...

4
by Clarke, Glen E.
Published 2018
McGraw-Hill Education
Table of Contents: ... -- Identifying Types of Policies -- Understanding Regulations and Standards -- General Security Policies...

5
by Rhodes-Ousley, Mark
Published 2013
McGraw Hill Education
Table of Contents: ..., Standards, Procedures, and Guidelines -- Security Policies -- Security Policy Development -- Security Policy...

6
by Chowdhary, Ankush
Published 2023
Packt Publishing, Limited
Table of Contents: ... policy bindings -- Policy structure -- Policy inheritance and resource hierarchy -- IAM Conditions...

7
by Morimoto, Rand
Published 2008
Sams
Table of Contents: ... and Management -- 18. Windows Server 2008 Administration -- 19. Windows Server 2008 Group Policies and Policy...

8
by Death, Darren
Published 2023
Packt Publishing Ltd.
Table of Contents: ... security policies -- Information security system-specific policy -- Planning policy -- Access controls...

9
by Clarke, Glen E.
Published 2014
McGraw-Hill
Table of Contents: ... and Standards -- Looking at Security Policies Policies Affecting Users -- Policies Affecting Administrators...

10
by Schrijvers, Erik, Prins, Corien, Passchier, Reijer
Published 2021
Springer International Publishing
... stated goal of security policy and policies that aim to safeguard the continuity of critical...

11
by Morimoto, Rand
Published 2012
Sams
Table of Contents: ... policies and policy management -- Windows Server 2012 management and maintenance practices -- Automating...

12
by Gibson, Darril
Published 2010
Wiley
Table of Contents: ... -- Configuring UAC via Group Policy -- Security Policies -- Local Security Policy vs. Group Policy -- Account...

13
Published 1992
Springer Vienna
Table of Contents: ... and Training in the CASE Tool Environment -- Science Policy -- Research Policy in Information Technology...

14
by Death, Darren
Published 2017
Packt Publishing
Table of Contents: ... -- Information security policies -- Information security program policy -- Operational policy -- System-specific...

15
by Haber, Morey J.
Published 2020
Apress L.P.
Table of Contents: ... for Access Compliance -- Separation of Duty (SoD) Policies -- Account Policies...

16
by Vermeulen, Sven
Published 2020
Packt Publishing, Limited
Table of Contents: ... and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules...

17
by Brown, Jason
Published 2023
Packt Publishing, Limited
Table of Contents: ... for policy documents -- Creating new policies -- Reviewing policies -- Building a framework layout...

18
by Sivarajan, Santhosh
Published 2015
Packt Publishing
Table of Contents: ...; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result...

19
by Gilman, Evan, Barth, Doug
Published 2017
O'Reilly Media
Table of Contents: ...; Enforcement; Policy Engine; Policy Storage; What Makes Good Policy?; Who Defines Policy?; Trust Engine; What...

20
by Vermeulen, Sven
Published 2016
Packt Publishing
Table of Contents: ...Writing SELinux policiesDistributing policies through modules; Bundling modules in a policy store...