When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of...
An effective ISO 9001:2000 quality management system, driven by a fully compliant quality manual, is key in meeting ISO 9000 quality standards and a must for obtaining ISO certification. Written by an RAB certified quality management systems lead auditor, with forty years of industrial experience – who has a 10-year track record in either the...
This book is for anyone using or considering Puppet as a systems automation tool.
Readers of this book should be familiar with Linux systems administration and basic
Ruby. I’ll cover the basics of using Puppet manifests for configuration management and
techniques for executing and managing those configurations with...
Windows Internals, Sixth Edition is intended for advanced computer professionals
(both developers
and system administrators) who want to understand how the
core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating
systems work internally. With this knowledge, developers can better...
The passage of the Sarbanes-Oxley Act (SOx) in 2002 almost seems like distant history today. That legislation became effective after a series of accounting scandals led to the failure of several then major corporations, such as Enron and WorldCom, the conviction and imprisonment of multiple key executives, and the failure of the major public...
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
The third edition of this text contains key improvements and changes that continue to
provide instructors and students with the best information technology auditing text
available. This edition has been reorganized and expanded to address the internal control
and audit issues mandated by Sarbanes-Oxley legislation. The third edition...
Microsoft® Dynamics CRM 2011 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, managing, and securing the newest version of Dynamics CRM. Authored by three leading Microsoft Dynamics implementers, it illuminates new opportunities to deploy CRM as a hosted service (SaaS), integrate with...
At last, a security book just for Solaris and UNIX(r) system administrators. Learn the specifics for making your system secure, whether it's an organization-wide network or a standalone workstation. Expert author Peter Gregory has managed security for everything from top-secret corporate research facilities to casinos.