Flylib.com
Part II: Auditing Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 3: Auditing Entity-Level Controls
Chapter 4: Auditing Data Centers and Disaster Recovery
Chapter 5: Auditing Switches, Routers, and Firewalls
Chapter 6: Auditing Windows Operating Systems
Chapter 7: Auditing Unix and Linux Operating Systems
Chapter 8: Auditing Web Servers
Chapter 9: Auditing Databases
Chapter 10: Auditing Applications
Chapter 11: Auditing WLAN and Mobile Devices
Chapter 12: Auditing Company Projects
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Documenting Software Architectures: Views and Beyond
Notations for C&C Styles
For Further Reading
For Further Reading
For Further Reading
Two Examples
C++ GUI Programming with Qt 3
Signals and Slots in Depth
Integrating Custom Widgets with Qt Designer
Widget Stacks
Pointer-Based Containers
Connecting and Querying
MySQL Clustering
Before You Begin with MySQL Cluster
SQL Nodes
Restoring a Backup
Benchmarking
An Overview of Binary Options
Cisco CallManager Fundamentals (2nd Edition)
Summary
Overview of Station Device Features Supported by CallManager
Summary
Creation and Usage of CDR Data
Application Solutions
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 8. Publish Maps of Your Photos on the Web
Hack 36. Shorten Online Map URLs
Hack 53. Visualize Your Tracks in Three Dimensions
Hack 71. Turn Your Tracklogs into ESRI Shapefiles
Hack 84. Build a Free World Gazetteer
VBScript in a Nutshell, 2nd Edition
WSC Programming Topics
Section A.16. User Interaction
Section B.2. Comparison Constants
Section C.1. Arithmetic Operators
Section E.2. Script Encoder Syntax
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies