Flylib.com
Part II: Auditing Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 3: Auditing Entity-Level Controls
Chapter 4: Auditing Data Centers and Disaster Recovery
Chapter 5: Auditing Switches, Routers, and Firewalls
Chapter 6: Auditing Windows Operating Systems
Chapter 7: Auditing Unix and Linux Operating Systems
Chapter 8: Auditing Web Servers
Chapter 9: Auditing Databases
Chapter 10: Auditing Applications
Chapter 11: Auditing WLAN and Mobile Devices
Chapter 12: Auditing Company Projects
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
CISSP Exam Cram 2
The Role of CIA
Computer System Architecture
Exam Prep Questions
Exam Prep Questions
Symmetric Encryption
High-Speed Signal Propagation[c] Advanced Black Magic
Ideal Transmission Line
Equivalence Principle for Transmission Media
Glossary of Cabling Terms
Making Glass Fiber
Wavelengths of Operation
Building Web Applications with UML (2nd Edition)
HTTP
Activities
Discussion
The Vision
Activities
Information Dashboard Design: The Effective Visual Communication of Data
All That Glitters Is Not Gold
Exceeding the Boundaries of a Single Screen
Tapping into the Power of Visual Perception
Make the Viewing Experience Aesthetically Pleasing
Sample Sales Dashboard
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Adding Text to Shapes and the Drawing Page
Creating Timelines to View Projects at a Glance
Creating Organization Charts
Customizing the Layout of Organization Charts
Storing Information with Network Shapes
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Cultural Black Holes
The China Phenomenon
Empires Past, Present, and Future
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies