101
by Peikari, Cyrus
Published 2003
Sams Pub.
Table of Contents: .... Auditing tools -- 10. Pocket PC hacking -- 11. Wireless hack walkthrough -- Part IV: Wireless security. 12...

102
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ... -- ch. 16. Crafting a security policy -- ch. 17. Performing security analyses and audits -- ch. 18...

103
by Snedaker, Susan
Published 2007
Syngress
Table of Contents: .... Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan...

104
by Ferraro, Eugene
Published 2012
CRC Press
Table of Contents: ... -- Methods and applications -- Research and audit -- The fundamentals of research and audit -- Statutory...

105
by Orebaugh, Angela
Published 2008
Syngress Pub.
Table of Contents: ... will also cover the uses of nmap such as security auditing, policy compliance testing, network inventory...

106
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10...

107
by Gregg, Michael
Published 2009
Pearson IT Certification
... practices ranging from risk management to operations and auditing Understand and perform the crucial non...

108
by Wright, Steve
Published 2011
IT Governance Pub.
Table of Contents: ... Analysis; Chapter 6: Step 6 -- Establish the Baseline; Chapter 7: Step 7 -- Auditing; Chapter 8: Step 8...

109
by Muhlfeit, Jan, Costi, Melina
Published 2017
Pearson Education
Table of Contents: ...) -- Strengths audit (unlocking strengths and getting authentic) -- Creating super-talented teams -- Personal...

110
by Rahalkar, Sagar
Published 2018
Packt Publishing
Table of Contents: ... ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non...

111
Published 2022
Edward Elgar Publishing
Table of Contents: ...15. The impact of the audit committee and internal audit function on board decision making during...

112
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Table of Contents: ... Detection System Signatures; Recipe 1-5: Using Bayesian Attack Payload Detection; HTTP Audit Logging; Recipe...

113
by Bücker, Axel
Published 2006
IBM, International Technical Support Organization
... by discussing the planning, installation, configuration and customization, programming, auditing...

114
by Bücker, Axel, Annas, Andrew, Faustini, Alessandro, Sanui, Takayoshi
Published 2006
IBM Corporation
... challenges addressing enhanced auditing and reporting, and designing and creating your own self-care/self...

115
by L'Esteve, Ron C.
Published 2023
Apress
Table of Contents: ....Designing a Secure Data Lake -- 12. Administering and Auditing the Cloud -- 13. Collaborating with Cloud...

116
by Schou, Corey
Published 2015
McGraw-Hill Education
Table of Contents: ... Security Certification Consortium -- Computing Technology Industry Association -- Information System Audit...

117
by Fitzwater, Terry L.
Published 1999
HRD Press
Table of Contents: ... plan -- Importance of compliance -- Recommended actions -- The employment practices audit...

118
by Williams, Randy
Published 2011
Wiley Pub.
Table of Contents: ...; Part III: Managing SharePoint 2010; Chapter 14: Managing Security; Chapter 15: Managing Auditing...

119
by Bacon, Ryan, Crawley, Kim
Published 2021
O'Reilly Media, Inc.
... visibility for auditing, compliance, and management Continuous, uninterrupted network uptime A fully modern...

120
by Kocjan, Wojciech
Published 2010
Packt Pub.
Table of Contents: ...; Audit; Recap of the audit package; Debugging; Tcl Dev Kit Inspector; Tcl Dev Kit Debugger; Local...