Flylib.com
Part I: Audit Overview
Previous page
Table of content
Next page
Chapter List
Chapter 1: Building an Effective Internal IT Audit Function
Chapter 2: The Audit Process
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Snort Cookbook
Reading a Saved Capture File
Logging to a CSV File
Administering Snort with IDS Policy Manager
Analyzing and Graphing Logs
Recognizing HTTP Traffic on Unusual Ports
Cisco CallManager Fundamentals (2nd Edition)
Case Studies
SIP
Summary
Monitoring Tools
Appendix C. Protocol Details
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
Twisted Network Programming Essentials
Accessing a Password-Protected Page
Responding to HTTP Requests
Enabling Web Services Using XML-RPC
Running Commands on a Remote Server
Managing Multiple Services
FileMaker 8 Functions and Scripts Desk Reference
Aggregate Functions
Get(LayoutTableName)
ValueListItems()
System Constants
Command Line Reference
Java All-In-One Desk Reference For Dummies
Making Your Own Classes
Working with Strings
Network Programming
Creating Applets
Using JDBC to Connect to a Database
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies