Flylib.com
Part II: Auditing Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 3: Auditing Entity-Level Controls
Chapter 4: Auditing Data Centers and Disaster Recovery
Chapter 5: Auditing Switches, Routers, and Firewalls
Chapter 6: Auditing Windows Operating Systems
Chapter 7: Auditing Unix and Linux Operating Systems
Chapter 8: Auditing Web Servers
Chapter 9: Auditing Databases
Chapter 10: Auditing Applications
Chapter 11: Auditing WLAN and Mobile Devices
Chapter 12: Auditing Company Projects
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
CISSP Exam Cram 2
Put Yourself to the Test
Programming Languages
Computer Crimes
Symmetric Encryption
Answers to Exam Prep Questions
MySQL Clustering
Before You Begin with MySQL Cluster
Startup Phases
Restarting a Cluster
Troubleshooting Backups
Displaying the Status of the Cluster/Controlling Nodes
Data Structures and Algorithms in Java
Summary
Timing
Merge Sort
General Trees
Problems
MySQL Cookbook
Numbering Query Output Lines
Sorting by Day of Week
Listing Tables and Databases
Determining Whether to Resequence a Column
Performing a Join Between Tables in Different Databases
File System Forensic Analysis
Summary
Bibliography
Disk Spanning
Bibliography
Summary
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Oracle and PL/SQL
Indirect Privilege Escalation
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies