O'Reilly logo

The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web by Ron Lepofsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

APPENDIX A

image

COBIT® 5 for Information Security

The material in this appendix is taken from an ISACA® document titled COBIT® 5 for Information Security.1 I have included it here as a convenient compliance resource to refer to since it is mentioned in Chapter 8, “Integrating Compliance with Web Application Security,” and in several places throughout the book.

The information is reproduced verbatim from the ISACA publication. The references within this information include mention of Appendix B and Appendix F. For clarity, these appendices are COBIT® 5 for Information Security appendices and not appendices from this book. Since this is copyrighted information, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required