 |
|
 Mainframe Basics for Security Professionals: Getting Started with RACFSecurity—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers... |  |  Oracle Database 11g DBA Handbook (Osborne Oracle Press)The Essential Resource for Oracle DBAs--Fully Updated and Expanded
Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new... |  |  System Center Operations Manager 2007 UnleashedThe process of operations management is a combination of people, procedures, and tools—all three are necessary, and the absence of one component can put an entire enterprise solution at risk. At a more granular level, operations management is about correlating what may appear to be seemingly unrelated events and data across machines to... |
|
 Fuzzing: Brute Force Vulnerability DiscoveryThe concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered... |  |  Digital Accounting: The Effects of the Internet And Erp on AccountingDigital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a... |  |  OS X Exploits and DefenseLong believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an... |
|
|
 CISA Review Manual 2008The CISA Review Manual 2008 has been completely revised and updated with new content to reflect changing industry principles and practices, and is organized according to the current CISA job practice areas. The manual features detailed descriptions of the tasks performed by IS auditors and the knowledge required to plan, manage and perform IS... |  |  Handbook of Software Quality AssuranceThe industry's top guide to software quality -- completely updated!
Practical techniques for mission-critical and commercial software.
Build a great software quality organization.
Prepare for ASQ Software Quality Engineer Certification.
Software quality assurance has never been more challenging -- nor more... |  |  Information Technology Control and Audit, Third EditionThe book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld. — Information Systems Control Journal
Now in its third edition, this book is an excellent introductory... |
|
| Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |