Flylib.com
List of Exhibits
Previous page
Table of content
< Day Day Up >
Chapter 1: Risk Management
Exhibit 1: Laws Affecting Industries
Exhibit 2: Example of Simple Gantt Chart
Exhibit 3: Example of Simple Critical Path Method Chart
Exhibit 4: Sample Questionnaire
Exhibit 5: Risk Assessment Schedule
Exhibit 6: Information Classification Schedule
Exhibit 7: Asset Protection Schedule
Exhibit 8: Risk Assessment Report
Chapter 2: Policies and Procedures
Exhibit 1: Policy Format
Exhibit 2: Sample Acceptable E-Mail Use Policy Language
Exhibit 3: Sample E-Mail Retention Policy
Exhibit 4: Expectation of Privacy
Exhibit 5: Waiver of Privacy Rights
Exhibit 6: No User Privacy in Communications
Exhibit 7: Automated User Monitoring
Exhibit 8: Privacy Statement
Exhibit 9: Electronic Privacy Statement
Exhibit 10: Language Use in Communications
Exhibit 11: Copyright Sample
Exhibit 12: Software Copyright Sample
Exhibit 13: Proprietary and Sensitive Information Sample
Exhibit 14: Employee Responsibility Statement
Exhibit 15: Sending Unsolicited E-Mail or Spam
Exhibit 16: Attorney-Client E-Mail Footer Sample
Exhibit 17: Attorney-Client E-Mail
Exhibit 18: Employee Responsibility for Entry Methods
Exhibit 19: Password Maintenance
Exhibit 20: Employee-Installed Software and Storage Media Use
Exhibit 21: Entry Notice Banner
Exhibit 22: Log-In Banner Policy
Exhibit 23: System Development Policy
Exhibit 24: Workplace Safety Policy
Exhibit 25: Forensics Examination Policy
Exhibit 26: Protecting Employee Personal Information Policy
Exhibit 27: Multiple or Dual-Homed Firewall Policy
Exhibit 28: Screened Sub-Network Policy
Exhibit 29: Firewall Administration Policy
Exhibit 30: Firewall Administrator Policy
Exhibit 31: Firewall Administration Policy
Exhibit 32: Firewall Backup Policy
Chapter 3: Auditing
Exhibit 1: Management Functions
Exhibit 2: Application Functions
Exhibit 3: Document Flowchart
Exhibit 4: Data Flowchart
Exhibit 5: System Flowchart
Exhibit 6: Program Flowchart
Exhibit 7: Audit Management Plan for Firewall Administration Unit
Exhibit 8: Backup and Data Recovery Audit Program
Exhibit 9: Audit Report for XYZ Corporation Backup and Recovery Unit
Exhibit 10: General Controls Review for IT Department
Exhibit 11: Packet Filtering Security Table
Exhibit 12: Domain Registration Queries
Exhibit 13: SamSpade
Exhibit 14: SuperScan
Exhibit 15: Sample Output of Nmap
Exhibit 16: Sample of Nmap Results
Exhibit 17: C:\ netstat -na
Exhibit 18: Localhost #nmap -O -sS
Exhibit 19: [bash] $ nslookup
Exhibit 20
Exhibit 21: Vulnerability Scanners
Exhibit 22: Nessus Plugins
Exhibit 23: Nessus Preferences
Exhibit 24: Nessus Plugin Families
Exhibit 25: Nessus Report Sample
Exhibit 26: Nessus Scan Options
Exhibit 27: Automated Vulnerability Sample Finding Report
Exhibit 28: Firewall Policy Sample
Exhibit 29: Typical Wireless System
Exhibit 30: Wilbur Configuration
Exhibit 31: Wilbur Options
Chapter 4: Critical Incident Response and CIRT Development
Exhibit 1: IP Address Blocks
Exhibit 2: CIDR Addressing Blocks
Exhibit 3: Chain of Custody Schedule
Exhibit 4: BIOS Access Information
Exhibit 5: Typical Disk Geometry
Exhibit 6: Relative Addressing
Exhibit 7: Typical Floppy Disk Geometry
Exhibit 8: Partitions and Cluster Sizes
Exhibit 9: Boot Utilities
Exhibit 10: Netstat Connections
Exhibit 11: Common Activity Codes
Exhibit 12: IP Resolution in SamSpade
Exhibit 13: SamSpade Tools
Exhibit 14
Chapter 5: Legal Matters
Exhibit 1
Exhibit 2
Chapter 6: Privacy
Exhibit 1: Sample Web Site Privacy Statement
< Day Day Up >
Previous page
Table of content
Critical Incident Management
ISBN: 084930010X
EAN: 2147483647
Year: 2004
Pages: 144
Authors:
Alan B. Sterneckert
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Introduction to Computer Programming
Characters, Strings, and Text Output
Game Graphics Learning to Use Bitmaps
Programming the Keyboard, Mouse, and Joystick
Playing Some Tunes CD Audio, MIDI and MP3 Music
Adobe After Effects 7.0 Studio Techniques
Output: The Render Queue
The Timeline
Combining Multiple Masks
Blue-Screen and Green-Screen Keying
Particulate Matter
FileMaker Pro 8: The Missing Manual
Sorting Records
Advanced Relationship Techniques
Sharing Over the Internet
Disable Script Steps
Copying Database Structure
A Practitioners Guide to Software Test Design
The Testing Process
Boundary Value Testing
Data Flow Testing
Section IV - Supporting Technologies
Appendix A Brown & Donaldson Case Study
Information Dashboard Design: The Effective Visual Communication of Data
Clarifying the Vision
Choosing Inappropriate Display Media
Highlighting Important Data Ineffectively or Not at All
Characteristics of a Well-Designed Dashboard
Putting It All Together
Web Systems Design and Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XII Web Design and E-Commerce
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies