B


backdoors, 242

BackTrack, 272

backup and recovery, 36, 85, 95, 107-108, 229, 260, 288-289

basic service set (BSS), 264

biometric authentication devices, in data center, 92

blade antennas, 272

bootcfg tool, 139, 143

broken authentication, 215-216

BSS (basic service set), 264

BSSID (BSS identifier), 264

budget

for projects, 290

tracking performance against, 65

burglar alarms, 84, 96

business applications, 38

business functions, identifying, 357-358

business threats, assessing, 361-362

financial threats, 361

legal threats, 361-362

overview, 361

regulatory threats, 362



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net