121
by Fitzwater, Terry
Published 1998
HRD Press
Table of Contents: ... this guidebook -- The employer audit to assess liability -- CH36;146; The basics of harassment...

122
by Field, Alan
Published 2017
IT Governance Ltd
Table of Contents: ... Bribery -- The nuts and bolts -- Chapter 9: Internal Auditing and Corrective Action -- Where the action...

123
by Copeland, Marshall
Published 2017
Apress
..., web application firewalls, and database auditing for threat protection. Configure custom security...

124
by Susan Snedaker
Published 2007
Syngress
Table of Contents: ..., and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists...

125
by Rice, Liz, Hausenblas, Michael
Published 2018
O'Reilly Media
... topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection...

126
by Potter, Bruce
Published 2003
New Riders
... auditing and forensics and what to do when an OS X network is compromised. This section teaches readers...

127
by Drewitt, Tony
Published 2012
IT Governance Publishing
Table of Contents: ... SOFTWARE VENDORS; APPENDIX 11: SUGGESTED SOFTWARE ENQUIRY FORM; APPENDIX 12: BCM AUDIT PROGRAMME...

128
by Natwick, Dwayne
Published 2023
PACKT Publishing Limited
Table of Contents: ...Logging and auditing for threat and vulnerability detection -- Developing security operations...

129
by Adams, Ed
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... -- Sniffing Out the Bakers -- CISO as Proxy for Cyber Staff -- Cybersecurity Law, Insurance, and Audit...

130
by Lachance, Daniel, Clarke, Glen E.
Published 2017
McGraw-Hill Education
... Continuity • Computer Forensics • Security Assessments and Audits • Monitoring and Auditing Electronic...

131
by Maginnis, Jerry
Published 2021
Wiley
... in any accounting, auditing, or tax textbook. And it is written in a fun and engaging style with a simple...

132
by Clarke, Glen E.
Published 2022
McGraw-Hill
... and Auditing " Security Assessments and Audits " Incident Response and Computer Forensics Online Content...

133
by Della Maggiora, Paul L.
Published 2000
Cisco Press
Table of Contents: ...pt. I. Foundations, Approaches, and Tools -- Ch. 1. Conducting a Network Audit -- Ch. 2. Policy...

134
by Price, Brad
Published 2007
Wiley Pub.
Table of Contents: ... -- Maintenance Mode -- The Bottom Line -- CH36;Chapter 858; Audit Collection Services and Agentless Exception...

135
by Dhru, Nidhish
Published 2018
Apress
Table of Contents: ... and Accountability Act) with BAA; HITRUST; Secure File Sharing; Mobile Device Management; Data Loss Prevention; Audit...

136
by Stewart, James Michael
Published 2009
Wiley Pub.
Table of Contents: ....; Review Questions; Answers to Review Questions; Chapter 4: Assessments and Audits; 4.1 Conduct risk...

137
by Lakhe, Bhushan
Published 2014
Apress
... through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation...

138
by Rehberger, Johann
Published 2020
Packt Publishing
... with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end...

139
by Meyler, Kerrie
Published 2013
Sams

140
by Santos, Omar, Radanliev, Petar
Published 2024
Addison-Wesley
... and infrastructure security, secure development practices, monitoring and auditing, supply chain security, and secure...