101
by Rao, Umesh Hodeghatta, Nayak, Umesha
Published 2014
ApressOpen, Distributed to the Book trade worldwide by Springer
Table of Contents: ...Integration and Deployment -- Operations -- Monitoring -- Legal Compliance and Audit -- Crisis...

102
by Ansari, Sepita
Published 2017
MITP Verlags GmbH & Co. KG
Table of Contents: ... Content-Audit -- 2.2.5 Strategieformulierung -- 2.3 Storytelling...

103
by Sarkar, Aurobindo, Shah, Amit
Published 2018
Packt Publishing
Table of Contents: ... analysis -- Using third-party security solutions -- Reviewing and auditing security configuration...

104
by Jacob, Cedric F.
Published 2017
Packt Publishing
Table of Contents: ... Markup Language (SAML) -- IP restrictions -- Using custom roles to reduce unnecessary access -- Auditing...

105
by Fordham, Stuart
Published 2017
Packt Publishing
Table of Contents: ...... -- Viewing events -- How to do it... -- Tenant events -- Fabric events -- AAA events -- Navigating the audit...

106
by White, Tom
Published 2015
O'Reilly Media
Table of Contents: ... -- Chapter 11. Administering Hadoop -- HDFS -- Persistent Data Structures -- Safe Mode -- Audit Logging...

107
by Chacon, Scott, Straub, Ben
Published 2014
Apress, Distributed to the Book trade worldwide by Spring Science+Business Media
Table of Contents: ... an Organization -- Organization Basics -- Teams -- Audit Log -- Scripting GitHub -- Hooks -- Services -- Hooks...

108
by Halvorson, Kristina
Published 2012
New Riders
...Describes the value of content strategy, discusses how to audit and analyze content, and looks...

109
by Goldberg, Danny M.
Published 2014
John Wiley
.... This is the story of a leading internal audit department taking that next step to becoming...

110
by Finnegan, Ruth H.
Published 2023
ROUTLEDGE
... qualities of human interconnecting and the senses of touch, olfaction and, above all, audition and vision...

111
by Dalziel, Henry
Published 2015
Elsevier
... audit and test organization security, often in a secretive setting. The entire point of the Red Team...

112
by Wong, Ronnie
Published 2023
Packt Publishing
... Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology....

113
by Russinovich, Mark E.
Published 2011
Microsoft Press
... for application troubleshooting Audit and analyze file digital signatures, permissions, and other security...

114
by Sandfort, Jodi
Published 2015
Jossey-Bass/A Wiley Brand

115
by Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
..., CEO and Internal Audit, of the diverse executive management functions that need to team up...

116
by Zadka, Moshe
Published 2019
Apress
...-style tasks. You'll then move on to more advanced cases, like using Jupyter as an auditable remote...

117
Published 2023
O'Reilly Media, Inc.
... practices for smart contract security. Key components of a smart contract security audit. And you'll be able...

118
by Jellema, Lucas
Published 2016
McGraw-Hill Education
... Establish KPIs and evaluate performance using Oracle Business Activity Monitoring Control traffic, audit...

119
by Scholz, James A.
Published 2014
CRC Press, Taylor & Francis Group
... assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits...

120
by Bluck, Alan S.
Published 2023
Apress
... IBM System, IBM Business Automation Workflow to create an Audit System. You'll learn how to implement...