Flylib.com
Part III: Frameworks, Standards, and Regulations
Previous page
Table of content
Next page
Chapter List
Chapter 13: Frameworks and Standards
Chapter 14: Regulations
Chapter 15: Risk Management
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Creating a Basic Logical Database Model
Editing Logical Models”Intermediate Aspects
Editing Logical Models”Advanced Aspects
Logical Database Model Reports
Software Configuration Management
The DoD CM Process Model
Configuration Identification
A Practical Approach to Configuration Verification and Audit
Appendix E Test Plan
Appendix N Corrective Action Processing (CAP)
Network Security Architectures
Network Security Axioms
Small Network Edge Security Design
Case Studies
References
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Transmission Control Protocol (TCP) Basics
Dynamic Host Configuration Protocol (DHCP) Server Service
Domain Name System (DNS)
Internet Protocol Security (IPSec)
Virtual Private Networks (VPNs)
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Success Story #1 Lockheed Martin Creating a New Legacy
Phase 1 Readiness Assessment
Phase 4 Performance and Control
First Wave Service Projects
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Querying WMI
Instrumenting .NET Applications with WMI
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies