Part II: Auditing Techniques

Chapter List

Chapter 3: Auditing Entity-Level Controls
Chapter 4: Auditing Data Centers and Disaster Recovery
Chapter 5: Auditing Switches, Routers, and Firewalls
Chapter 6: Auditing Windows Operating Systems
Chapter 7: Auditing Unix and Linux Operating Systems
Chapter 8: Auditing Web Servers
Chapter 9: Auditing Databases
Chapter 10: Auditing Applications
Chapter 11: Auditing WLAN and Mobile Devices
Chapter 12: Auditing Company Projects

IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
Year: 2004
Pages: 159 © 2008-2017.
If you may any questions please contact us: