Flylib.com
Part I: Audit Overview
Previous page
Table of content
Next page
Chapter List
Chapter 1: Building an Effective Internal IT Audit Function
Chapter 2: The Audit Process
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
What Is Project Management…Exactly?
Why Communicating Can Be Tough
Essential Elements of Managing Expectations
Managing Differences
Common Project Closing Challenges
Certified Ethical Hacker Exam Prep
The Attackers Process
Key Terms
Enumeration
Trojans and Backdoors
Physical Security
High-Speed Signal Propagation[c] Advanced Black Magic
Impedance of Linear, Time-Invariant, Lumped-Element Circuits
Frequency-Domain Modeling
Making Glass Fiber
Intentional Delay Adjustments
IBIS: Issues with SSO Noise
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Organizational change
Part II - The Applications
Mergers and acquisitions
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
System Monitoring
Deployment Scenarios
Directing Traffic to the AIP-SSM
Advanced Features and Configuration
Monitoring and Troubleshooting WebVPN
Junos Cookbook (Cookbooks (OReilly))
Displaying the Commands to Recreate a Configuration
Creating an Emergency Rescue Configuration
Customizing Account Privileges
Configuring IPSec
Viewing Routes Learned by OSPF
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies