Flylib.com
Part II: Auditing Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 3: Auditing Entity-Level Controls
Chapter 4: Auditing Data Centers and Disaster Recovery
Chapter 5: Auditing Switches, Routers, and Firewalls
Chapter 6: Auditing Windows Operating Systems
Chapter 7: Auditing Unix and Linux Operating Systems
Chapter 8: Auditing Web Servers
Chapter 9: Auditing Databases
Chapter 10: Auditing Applications
Chapter 11: Auditing WLAN and Mobile Devices
Chapter 12: Auditing Company Projects
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
NI Vision Builder for Automated Inspection
Charge-Coupled Devices
Video Standards
Frame Grabbing
Spatial Image Filtering
Oracle Developer Forms Techniques
Ordering by Foreign Key Items in Forms
Base Tables
The Basics of Error-Message Handling
Additional Interesting Techniques
Shrinking Trees
Adobe After Effects 7.0 Studio Techniques
Previews and OpenGL
The Timeline
Uber-mastery
Optimizing Tracking Using 3D
Dynamic Range
Visual C# 2005 How to Program (2nd Edition)
Exercises
Introduction
Type Constraints
Synchronized Collections
J.5. Class CashDispenser
MPLS Configuration on Cisco IOS Software
MPLS Terminology
Penultimate Hop Popping
PE-CE Routing Protocol-Static and RIP
Carrier Supporting Carriers Overview
Command Reference
Java All-In-One Desk Reference For Dummies
Making Choices
Understanding Object-Oriented Programming
Using Subclasses and Inheritance
Swinging into Swing
Using Layout Managers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies