Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Mac OS X Security
Mac OS X Security
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of...
ISO 9001: 2000 Quality Management System Design
ISO 9001: 2000 Quality Management System Design
An effective ISO 9001:2000 quality management system, driven by a fully compliant quality manual, is key in meeting ISO 9000 quality standards and a must for obtaining ISO certification. Written by an RAB certified quality management systems lead auditor, with forty years of industrial experience – who has a 10-year track record in either the...
Managing Infrastructure with Puppet
Managing Infrastructure with Puppet

This book is for anyone using or considering Puppet as a systems automation tool. Readers of this book should be familiar with Linux systems administration and basic Ruby. I’ll cover the basics of using Puppet manifests for configuration management and techniques for executing and managing those configurations with...

Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Sixth Edition is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating systems work internally. With this knowledge, developers can better...
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
The passage of the Sarbanes-Oxley Act (SOx) in 2002 almost seems like distant history today. That legislation became effective after a series of accounting scandals led to the failure of several then major corporations, such as Enron and WorldCom, the conviction and imprisonment of multiple key executives, and the failure of the major public...
Hack Proofing XML
Hack Proofing XML
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Microsoft Dynamics CRM 2011 Unleashed
Microsoft Dynamics CRM 2011 Unleashed

Microsoft® Dynamics CRM 2011 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, managing, and securing the newest version of Dynamics CRM. Authored by three leading Microsoft Dynamics implementers, it illuminates new opportunities to deploy CRM as a hosted service (SaaS), integrate with...

IBM Cognos BI v10.2 Administration Essentials
IBM Cognos BI v10.2 Administration Essentials

Explore the power and scalability of IBM Cognos BI to achieve effective performance management

Overview

  • Apply drill-through definition feature to different areas of Cognos BI
  • Manage User profiles and User Interface Profiles
  • Full of step-by-step explanations on all the routine...
Solaris Security
Solaris Security
At last, a security book just for Solaris and UNIX(r) system administrators. Learn
the specifics for making your system secure, whether it's an organization-wide
network or a standalone workstation. Expert author Peter Gregory has managed
security for everything from top-secret corporate research facilities to casinos.
...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy