Home > Articles > Certification > Other IT

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Need to Know More?

http://www.jebcl.com/riskdo/riskdo.htm—Risk assessment do's and don'ts

http://www.usatoday.com/money/jobcenter/workplace/recruiting/2002-11-20-legal_x.htm—Keeping pre-employment checks legal

http://library.lp.findlaw.com/articles/file/00334/002357/title/Subject/topic/Employment%20Law_At-will%20Employment/filename/employmentlaw_1_454—Self-audits of employment practices

http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/sld001.htm—Building effective security policies

http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci1033304,00.html—Ten traits of effective policy

http://www.sans.org/resources/policies/—Policy templates and information

http://www.itl.nist.gov/lab/bulletns/bltnoct03.htm—Building an effective security-awareness program

http://www.computerworld.com/careertopics/careers/training/story/0,10801,54375,00.html—Methods to build effective security awareness

http://www.microsoft.com/technet/security/topics/policiesandprocedures/secrisk/srsgch02.mspx—Risk-management guide

  • + Share This
  • 🔖 Save To Your Account