|
|
|
|
Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... | | Excel Timesaving Techniques For Dummies (Computer/Tech)Covering formulas, charts, data lists, macros, and versions 2000, 2002, and 2003, this book offers more than seventy easy-to-follow techniques that show both new and experienced Excel users how to save time and avoid tedious or redundant tasks. Bestselling author Greg Harvey includes information on customizing Excel's menus and toolbars; modifying... | | Enterprise Mac Managed Preferences
Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple’s Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also... |
|
|
|
|
|
Result Page: 8 7 6 5 4 3 2 1 |