Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: The Audit Process
Table 2-1: Potential Opportunities for Auditing Centralized Activities
Chapter 5: Auditing Switches, Routers, and Firewalls
Table 5-1: Simplified OSI Model Description
Table 5-2: Routers and Switches
Table 5-3: Unnecessary Services
Chapter 6: Auditing Windows Operating Systems
Table 6-1: List of Common Commands Used in This Chapter
Table 6-2: Tools for Viewing Service Information
Table 6-3: Unnecessary Services
Table 6-4: Common Password Crackers
Table 6-5: Account Policies
Table 6-6: Audit Policies
Table 6-7: Tools and Technology-Auditing Windows
Chapter 7: Auditing Unix and Linux Operating Systems
Table 7-1: Common Unix and Linux Directories
Table 7-2: Common Linux and Unix Navigation Commands
Table 7-3: Interaction Between File and Directory Permissions
Table 7-4: Components of a Unix Password File
Table 7-5: Components of a Unix Shadow File
Table 7-6: Components of a Unix Group File
Chapter 8: Auditing Web Servers
Table 8-1: Web Auditing Components
Table 8-2: Minimum Apache Modules
Table 8-3: Common Methods for Bypassing Web Application Authorization
Table 8-4: Guiding Principles of Web Authentication
Chapter 9: Auditing Databases
Table 9-1: SQL Statement Descriptions
Table 9-2: Database Objects
Table 9-3: Default Passwords
Chapter 11: Auditing WLAN and Mobile Devices
Table 11-1: Common 802.11 Technologies
Table 11-2: Common WLAN Authentication Methods
Table 11-3: Mobile Operating Systems and Desktop Executables
Chapter 13: Frameworks and Standards
Table 13-1: Organizational Information Criticality Matrix
Chapter 14: Regulations
Table 14-1: HIPAA Security Rule Requirements
Chapter 15: Risk Management
Table 15-1: Information Criticality Matrix
Table 15-2: Types of Controls
Previous page
Table of content
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
The /proc Filesystem
Ending a Process
Semaphore Class
Exiting a Thread
Summary
Adobe After Effects 7.0 Studio Techniques
Workspaces and Panels
Settings: Project, Footage, Composition
Using 3D Tracking Data
Pyrotechnics: Fire, Explosions, Energy Phenomena
Rolling Thine Own
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Wide Area Network (WAN) Technologies
Address Resolution Protocol (ARP)
Internet Protocol (IP) Basics
Internet Control Message Protocol (ICMP)
Transmission Control Protocol (TCP) Retransmission and Time-Out
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hacks 19: Introduction
Hack 8. Generate Links to Google Maps in a Spreadsheet
Hack 29. Find the Best Gasoline Prices
Hack 31. Navigate Public Transportation
Hack 35. Load Driving Directions into Your GPS
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 1. Start Excel and Navigate a Workbook
Objective 12. Enter Dates and Clear Formats
GO! with Help
Project 3A. Fundraiser
Objective 3. Create a Chart in Excel
Digital Character Animation 3 (No. 3)
Chapter Four. Basics of Animation
Conclusion
Conclusion
Animating the Face
Four-Legged Mammals
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies