IT Auditing: Using Controls to Protect Information Assets
Author: Chris Davis
Protect Your Systems with Proven IT Auditing Strategies
"A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
Build and maintain an IT audit function with maximum effectiveness and value
- Implement best practice IT audit processes and controls
- Analyze UNIX-, Linux-, and Windows-based operating systems
- Audit network routers, switches, firewalls, WLANs, and mobile devices
- Evaluate entity-level controls, data centers, and disaster recovery plans
- Examine Web servers, platforms, and applications for vulnerabilities
- Review databases for critical controls
- Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
- Implement sound risk analysis and risk management practices
- Drill down into applications to find potential controlweaknesses
Chris Davis, CISA, CISSP, shares his experience from architecting, hardening, and auditing systems. He has trained auditors and forensic analysts. Davis is the coauthor of the bestselling Hacking Exposed: Computer Forensics.
Mike Schiller, CISA, has 14 years of experience in the IT audit field, most recently as the worldwide IT Audit Manager at Texas Instruments.
Kevin Wheeler, CISA, CISSP, NSA IAM/IEM, is the founder and CEO of InfoDefense and has over ten years of IT security experience.
Look this: Active Living Cognitive Functioning and Aging or An ADHD Primer
MCSA/MCSE: Windows XP Professional Study Guide (70-270)
Author: Lisa Donald
Here's the book you need to prepare for the Installing, Configuring, and Administering Microsoft Windows XP Professional exam (70-270). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that made Sybex the preferred choice for certification exam candidates, this book provides:
• Practical information on installing, configuring, and administering Windows XP Professional
• Updated and expanded information on key exam topics, including new Service Pack 2 enhancements
• Leading-edge exam preparation software, including a testing engine, electronic flashcards, and simulation software
Authoritative coverage of all exam objectives, including:
• Installing Windows XP Professional
• Implementing and conducting administration of resources
• Implementing, managing, and troubleshooting hardware devices and drivers
• Monitoring and optimizing system performance and reliability
• Configuring and troubleshooting the desktop environment
• Implementing, managing, and troubleshooting network protocols and services
• Implementing, monitoring, and troubleshooting security
Table of Contents:
Ch. 1 | Getting started with Windows XP Professional | 1 |
Ch. 2 | Automating the Windows XP installation | 37 |
Ch. 3 | Upgrading to Windows XP Professional | 93 |
Ch. 4 | Configuring the Windows XP environment | 117 |
Ch. 5 | Managing the Windows XP Professional desktop | 169 |
Ch. 6 | Managing users and groups | 195 |
Ch. 7 | Managing security | 237 |
Ch. 8 | Managing disks | 279 |
Ch. 9 | Accessing files and folders | 335 |
Ch. 10 | Managing network connections | 389 |
Ch. 11 | Managing printing | 439 |
Ch. 12 | Dial-up networking and Internet connectivity | 481 |
Ch. 13 | Optimizing Windows XP | 551 |
Ch. 14 | Performing system recovery functions | 605 |
No comments:
Post a Comment