Flylib.com
Part II: Auditing Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 3: Auditing Entity-Level Controls
Chapter 4: Auditing Data Centers and Disaster Recovery
Chapter 5: Auditing Switches, Routers, and Firewalls
Chapter 6: Auditing Windows Operating Systems
Chapter 7: Auditing Unix and Linux Operating Systems
Chapter 8: Auditing Web Servers
Chapter 9: Auditing Databases
Chapter 10: Auditing Applications
Chapter 11: Auditing WLAN and Mobile Devices
Chapter 12: Auditing Company Projects
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Snort Cookbook
Logging to System Logfiles
Detecting and Normalizing HTTP Traffic
Analyzing and Graphing Logs
Obfuscating IP Addresses
Passive OS Fingerprinting
Java How to Program (6th Edition) (How to Program (Deitel))
Using Command-Line Arguments
JButton
Wrap-Up
Summary
Client/Server Tic-Tac-Toe Using a Multithreaded Server
MySQL Cookbook
Breaking Down Time Intervals into Components
Selecting Records Based on Their Temporal Characteristics
Using AUTO_INCREMENT To Set Up a Sequence Column
Using a Join to Fill in Holes in a List
Collecting Web Input
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Conditional Logic
Using Procedures to Organize Scripts
Using the Windows Registry to Configure Script Settings
InDesign Type: Professional Typography with Adobe InDesign CS2
Clean Shaven or Rugged: Justified vs. Ragged Type
Up Next
Mo Style
Changing Columns
Things to Consider
Programming .Net Windows Applications
Windows Forms and the .NET Framework
Hello World
Web Applications Versus Windows Applications
Class Hierarchy
Toolbars
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies