1
by Davis, Chris
Published 2011
McGraw-Hill
Table of Contents: ...pt. 1. Audit overview -- pt. 2. Auditing techniques -- pt. 3. Frameworks, standards...

2
by Jackson, Chris
Published 2010
Cisco Press
...This complete new guide to auditing network security is an indispensable resource for security...

3
by Majumdar, Suryadipta, Madi, Taous, Wang, Yushun, Tabiban, Azadeh
Published 2019
Springer International Publishing
Table of Contents: ...1 Introduction -- 2 Literature Review -- 3 Auditing Security Compliance of Virtualized...

4
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ...The Automated Audit, Assertion, Assessment, and Assurance API 22 Recommended Controls 22 Risk...

5
by Lovelace, Mary
Published 2003
IBM, International Technical Support Organization
...) and auditing to ensure the integrity of the data managed by DFSMShsm. The DFSMShsm product provides the AUDIT...

6
by Wright, Christopher
Published 2014
IT Governance Pub.
Table of Contents: ...; Overview; Comparing Agile with waterfall; How to audit Agile/waterfall decision; Conclusion; Chapter 3: Why...

7
by Summers, Boyd L.
Published 2011
CRC Press
Table of Contents: ... configuration management -- ch. 9. Software supplier audit -- ch. 10. Software engineering reviews -- ch. 11...

8
by Chuprunov, Maxim
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Topics? -- PART II — From Concept to Content: Audit Guide for SAP ERP -- Audit-Relevant SAP Basics...

9
by Calderon, Paulino
Published 2021
Packt Publishing
Table of Contents: ... Pipelining, and Web Crawling Configuration Options Appendix B - Brute Force Password Auditing Options...

10
by Kenyon, Bridget
Published 2024
IT Governance Publishing
Subjects: ...Business enterprises / Computer networks / Security measures / Auditing...

11
by Pale, Paulino Calderon
Published 2012
Packt Pub.
Table of Contents: ...Intro -- Nmap 6: Network Exploration and Security Auditing Cookbook -- Table of Contents -- Nmap 6...

13
by Lad, Sagar
Published 2023
Apress
... of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your...

14
by Bush, Josephine
Published 2022
Apress
Table of Contents: ...Introduction -- Part I. Getting Started with Auditing.-1. Why Auditing is Important2. Types...

15
by Chatterjee, Rithik
Published 2021
Apress
Table of Contents: ... Hat Smart Management and Red Hat Insights -- Chapter 6: Red Hat Security Auditing -- Chapter 7: Case...

16
by Lad, Sagar
Published 2023
Apress
... of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your...

17
by Bush, Josephine
Published 2022
Apress
Table of Contents: ...Introduction -- Part I. Getting Started with Auditing.-1. Why Auditing is Important2. Types...

18
by Ben-Natan, Ron
Published 2009
CRC Press
Table of Contents: ... Auditing -- 10. Mandatory and Administrator Auditing -- 11. Fine-Grained Auditing -- 12. Auditing Before...

19
by Chatterjee, Rithik
Published 2021
Apress
Table of Contents: ... Hat Smart Management and Red Hat Insights -- Chapter 6: Red Hat Security Auditing -- Chapter 7: Case...

20
by Vladimirov, Andrew A.
Published 2010
IT Governance Pub.
Table of Contents: ...Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing...