Contingency Planning, Backup, and Recovery
Need to Know More?
www.penetration-testing.com/#4/ Penetration testing methodologies
www.isecom.org/osstmm/ The Open Source Security Testing Methodology Manual
www.police.txstate.edu/Presentations/internal.ppt/ Employee controls
http://keystroke-loggers.staticusers.net/laws.shtml/ Keystroke-monitoring ethics and laws
www.disasterplan.com// Contingency-management plans