Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: The Audit Process
Table 2-1: Potential Opportunities for Auditing Centralized Activities
Chapter 5: Auditing Switches, Routers, and Firewalls
Table 5-1: Simplified OSI Model Description
Table 5-2: Routers and Switches
Table 5-3: Unnecessary Services
Chapter 6: Auditing Windows Operating Systems
Table 6-1: List of Common Commands Used in This Chapter
Table 6-2: Tools for Viewing Service Information
Table 6-3: Unnecessary Services
Table 6-4: Common Password Crackers
Table 6-5: Account Policies
Table 6-6: Audit Policies
Table 6-7: Tools and Technology-Auditing Windows
Chapter 7: Auditing Unix and Linux Operating Systems
Table 7-1: Common Unix and Linux Directories
Table 7-2: Common Linux and Unix Navigation Commands
Table 7-3: Interaction Between File and Directory Permissions
Table 7-4: Components of a Unix Password File
Table 7-5: Components of a Unix Shadow File
Table 7-6: Components of a Unix Group File
Chapter 8: Auditing Web Servers
Table 8-1: Web Auditing Components
Table 8-2: Minimum Apache Modules
Table 8-3: Common Methods for Bypassing Web Application Authorization
Table 8-4: Guiding Principles of Web Authentication
Chapter 9: Auditing Databases
Table 9-1: SQL Statement Descriptions
Table 9-2: Database Objects
Table 9-3: Default Passwords
Chapter 11: Auditing WLAN and Mobile Devices
Table 11-1: Common 802.11 Technologies
Table 11-2: Common WLAN Authentication Methods
Table 11-3: Mobile Operating Systems and Desktop Executables
Chapter 13: Frameworks and Standards
Table 13-1: Organizational Information Criticality Matrix
Chapter 14: Regulations
Table 14-1: HIPAA Security Rule Requirements
Chapter 15: Risk Management
Table 15-1: Information Criticality Matrix
Table 15-2: Types of Controls
Previous page
Table of content
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 4.1 Authentication with Public Keys
Step 4.2 Passphrase Considerations
Conclusion
Software Configuration Management
Configuration Status Accounting
A Practical Approach to Configuration Verification and Audit
Configuration Management and Data Management
Configuration Change Management
Appendix C Sample Data Dictionary
C++ How to Program (5th Edition)
Summary
Self-Review Exercises
Using XHTML Forms to Send Input
Initializing Structures
Example: High-Performance Card Shuffling and Dealing Simulation
Programming Microsoft ASP.NET 3.5
Real-World Data Access
Web Forms User Controls
ASP.NET State Management
Working with the File System
Working with Web Services
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Controlling Text in a Drawing
Managing External References
Using Layouts to Set Up a Print
Appendix A Look at Drawing in 3D
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
The Quartz SchedulerFactory
Configuring a DataSource for JobStoreTX
Creating New JobStores
Registering Your Plug-Ins
Creating a Quartz RMI Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies