Flylib.com
List of Exhibits
Previous page
Table of content
< Day Day Up >
Chapter 1: Risk Management
Exhibit 1: Laws Affecting Industries
Exhibit 2: Example of Simple Gantt Chart
Exhibit 3: Example of Simple Critical Path Method Chart
Exhibit 4: Sample Questionnaire
Exhibit 5: Risk Assessment Schedule
Exhibit 6: Information Classification Schedule
Exhibit 7: Asset Protection Schedule
Exhibit 8: Risk Assessment Report
Chapter 2: Policies and Procedures
Exhibit 1: Policy Format
Exhibit 2: Sample Acceptable E-Mail Use Policy Language
Exhibit 3: Sample E-Mail Retention Policy
Exhibit 4: Expectation of Privacy
Exhibit 5: Waiver of Privacy Rights
Exhibit 6: No User Privacy in Communications
Exhibit 7: Automated User Monitoring
Exhibit 8: Privacy Statement
Exhibit 9: Electronic Privacy Statement
Exhibit 10: Language Use in Communications
Exhibit 11: Copyright Sample
Exhibit 12: Software Copyright Sample
Exhibit 13: Proprietary and Sensitive Information Sample
Exhibit 14: Employee Responsibility Statement
Exhibit 15: Sending Unsolicited E-Mail or Spam
Exhibit 16: Attorney-Client E-Mail Footer Sample
Exhibit 17: Attorney-Client E-Mail
Exhibit 18: Employee Responsibility for Entry Methods
Exhibit 19: Password Maintenance
Exhibit 20: Employee-Installed Software and Storage Media Use
Exhibit 21: Entry Notice Banner
Exhibit 22: Log-In Banner Policy
Exhibit 23: System Development Policy
Exhibit 24: Workplace Safety Policy
Exhibit 25: Forensics Examination Policy
Exhibit 26: Protecting Employee Personal Information Policy
Exhibit 27: Multiple or Dual-Homed Firewall Policy
Exhibit 28: Screened Sub-Network Policy
Exhibit 29: Firewall Administration Policy
Exhibit 30: Firewall Administrator Policy
Exhibit 31: Firewall Administration Policy
Exhibit 32: Firewall Backup Policy
Chapter 3: Auditing
Exhibit 1: Management Functions
Exhibit 2: Application Functions
Exhibit 3: Document Flowchart
Exhibit 4: Data Flowchart
Exhibit 5: System Flowchart
Exhibit 6: Program Flowchart
Exhibit 7: Audit Management Plan for Firewall Administration Unit
Exhibit 8: Backup and Data Recovery Audit Program
Exhibit 9: Audit Report for XYZ Corporation Backup and Recovery Unit
Exhibit 10: General Controls Review for IT Department
Exhibit 11: Packet Filtering Security Table
Exhibit 12: Domain Registration Queries
Exhibit 13: SamSpade
Exhibit 14: SuperScan
Exhibit 15: Sample Output of Nmap
Exhibit 16: Sample of Nmap Results
Exhibit 17: C:\ netstat -na
Exhibit 18: Localhost #nmap -O -sS
Exhibit 19: [bash] $ nslookup
Exhibit 20
Exhibit 21: Vulnerability Scanners
Exhibit 22: Nessus Plugins
Exhibit 23: Nessus Preferences
Exhibit 24: Nessus Plugin Families
Exhibit 25: Nessus Report Sample
Exhibit 26: Nessus Scan Options
Exhibit 27: Automated Vulnerability Sample Finding Report
Exhibit 28: Firewall Policy Sample
Exhibit 29: Typical Wireless System
Exhibit 30: Wilbur Configuration
Exhibit 31: Wilbur Options
Chapter 4: Critical Incident Response and CIRT Development
Exhibit 1: IP Address Blocks
Exhibit 2: CIDR Addressing Blocks
Exhibit 3: Chain of Custody Schedule
Exhibit 4: BIOS Access Information
Exhibit 5: Typical Disk Geometry
Exhibit 6: Relative Addressing
Exhibit 7: Typical Floppy Disk Geometry
Exhibit 8: Partitions and Cluster Sizes
Exhibit 9: Boot Utilities
Exhibit 10: Netstat Connections
Exhibit 11: Common Activity Codes
Exhibit 12: IP Resolution in SamSpade
Exhibit 13: SamSpade Tools
Exhibit 14
Chapter 5: Legal Matters
Exhibit 1
Exhibit 2
Chapter 6: Privacy
Exhibit 1: Sample Web Site Privacy Statement
< Day Day Up >
Previous page
Table of content
Critical Incident Management
ISBN: 084930010X
EAN: 2147483647
Year: 2004
Pages: 144
Authors:
Alan B. Sterneckert
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Mapping ORM Models to Logical Database Models
Conceptual Model Reports
Creating a Basic Logical Database Model
Reverse Engineering Physical Schemas to Logical Models
Change Propagation and Round Trip Engineering
Software Configuration Management
A Practical Approach to Configuration Verification and Audit
Appendix C Sample Data Dictionary
Appendix D Problem Change Report
Appendix E Test Plan
Appendix L Software Requirements Changes
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Answers and Explanations
Project PlanningFacilitating Processes
Answers and Explanations
Answers and Explanations
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Working with Ideas
Data Collection
Variation Analysis
Complexity Value Stream Mapping and Complexity Analysis
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Advanced Topic: Inspecting the Generated Code
Adding Controls at Runtime
Conclusion
Datasets, Adapters, and Sources
An End-to-End Scenario: Creating a Schema and Mapping It into a Word Document
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Modern Controls
Design-Time Support for Custom Controls
GDI+ Basics
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies