Flylib.com
Part II: Auditing Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 3: Auditing Entity-Level Controls
Chapter 4: Auditing Data Centers and Disaster Recovery
Chapter 5: Auditing Switches, Routers, and Firewalls
Chapter 6: Auditing Windows Operating Systems
Chapter 7: Auditing Unix and Linux Operating Systems
Chapter 8: Auditing Web Servers
Chapter 9: Auditing Databases
Chapter 10: Auditing Applications
Chapter 11: Auditing WLAN and Mobile Devices
Chapter 12: Auditing Company Projects
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Oracle Developer Forms Techniques
Standard Toolbar Implementation
Populating a PL/SQL Table from a Block
Intelligence in Forms
Smart Classes and Smart Triggers - How Smart Are They?
Planting and Growing Trees -Dynamically Adding Nodes Along with Data to an Existing Base Tree
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Leveraging Copy, Cut, Paste, and Paste Special
Using Arrays
VBA Help
Solving Nonlinear Equations Iteratively
Dealing with Double Integrals
C++ How to Program (5th Edition)
Overloading Unary Operators
Terminology
D.3. Converting Octal and Hexadecimal Numbers to Binary Numbers
Appendix G. ATM Case Study Code
G.2. Class ATM
Cultural Imperative: Global Trends in the 21st Century
Cultural Spectacles
Cultural Black Holes
Empires Past, Present, and Future
Epilogue After September 11
Appendix B Leadership Test
VBScript in a Nutshell, 2nd Edition
Global Code
Windows Script Host 5.6
What Can You Do with Client-Side Scripting?
Writing Component Code
Section B.5. Error Constant
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Arrays and Collections
Printing and Drawing with GDI+
Windows Services
ADO.NET
Web Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies