Flylib.com
Index_D
Previous page
Table of content
Next page
D
data encryption 3
data warehouse 4
denial of service (DoS) 3, 44, 121
deterrence-based trust 89
digital information 91
disaster recovery 67
disaster recovery plan 59
disaster recovery planning 104
Do Not Call list 11
dynamic host configuration protocol (DHCP) 127
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
CISSP Exam Cram 2
We Want to Hear from You!
Exam Strategy
Building Defense in Depth
Risk Assessment
Categories of Control
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Reducing the Risk of an Attack
Introducing the Assessment Process
Conclusions
Strategies for Information Technology Governance
Assessing Business-IT Alignment Maturity
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
Governing Information Technology Through COBIT
SQL Hacks
Hack 7. Modify a Schema Without Breaking Existing Queries
Hack 34. Calculate the Median
Hack 74. Compare and Synchronize Tables
Hack 86. Set Up Queuing in the Database
Hack 89. Choose Any Three of Five
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Cisco Secure IDS
Data Correlation
Incident Response
Laws, Standards, and Organizations
Security Business Issues
.NET-A Complete Development Cycle
Using Pens and Brushes in GDI+
Requirements for Image Postprocessing Components
Online Store Requirements
No Longer under Construction
Wrap-Up
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies