Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: The Audit Process
Table 2-1: Potential Opportunities for Auditing Centralized Activities
Chapter 5: Auditing Switches, Routers, and Firewalls
Table 5-1: Simplified OSI Model Description
Table 5-2: Routers and Switches
Table 5-3: Unnecessary Services
Chapter 6: Auditing Windows Operating Systems
Table 6-1: List of Common Commands Used in This Chapter
Table 6-2: Tools for Viewing Service Information
Table 6-3: Unnecessary Services
Table 6-4: Common Password Crackers
Table 6-5: Account Policies
Table 6-6: Audit Policies
Table 6-7: Tools and Technology-Auditing Windows
Chapter 7: Auditing Unix and Linux Operating Systems
Table 7-1: Common Unix and Linux Directories
Table 7-2: Common Linux and Unix Navigation Commands
Table 7-3: Interaction Between File and Directory Permissions
Table 7-4: Components of a Unix Password File
Table 7-5: Components of a Unix Shadow File
Table 7-6: Components of a Unix Group File
Chapter 8: Auditing Web Servers
Table 8-1: Web Auditing Components
Table 8-2: Minimum Apache Modules
Table 8-3: Common Methods for Bypassing Web Application Authorization
Table 8-4: Guiding Principles of Web Authentication
Chapter 9: Auditing Databases
Table 9-1: SQL Statement Descriptions
Table 9-2: Database Objects
Table 9-3: Default Passwords
Chapter 11: Auditing WLAN and Mobile Devices
Table 11-1: Common 802.11 Technologies
Table 11-2: Common WLAN Authentication Methods
Table 11-3: Mobile Operating Systems and Desktop Executables
Chapter 13: Frameworks and Standards
Table 13-1: Organizational Information Criticality Matrix
Chapter 14: Regulations
Table 14-1: HIPAA Security Rule Requirements
Chapter 15: Risk Management
Table 15-1: Information Criticality Matrix
Table 15-2: Types of Controls
Previous page
Table of content
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
Dialogs
Drag and Drop and the Clipboard
Programming OLE in Windows
Drawing Diagrams with Draw2D
Managing Enterprise Systems with the Windows Script Host
Shell Operations
File Operations
Input/Output Streams
Internet Information Server
Exchange Server
Postfix: The Definitive Guide
Email Topics
master.cf
Documentation
Separate Message Store
MySQL
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Retrieving Data from the Sample Database
Expression Evaluation and Type Conversion
Using PostgreSQL from an ODBC Client Application
Client 2Adding Error Checking
PostgreSQL Administration
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Exaggeration Equals Characterization
Making Movies from Stills
Atmosphere, Film, and Noise Effects
Motion Titling Effects
Comparing, Designing, and Deploying VPNs
Review Questions
Deploying MPLS Layer 3 VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Integrating L2TP Remote Access VPNs with MPLS VPNs
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies