Free Ebook Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
Currently, when you have one more idea to pick guide, exactly what you can do? It will certainly be better as well as less complicated to find Auditing And Security: AS/400, NT, UNIX, Networks, And Disaster Recovery Plans in this internet site because we provide you the direct connect to go to the book site. It will be much easier and faster to obtain it. Right here, soft data will actually assist you to save and also review it each time you desire. Obviously, it will not restrict you to read it in certain place.

Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
Free Ebook Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
The best ways to win the challenges that always require you to work rarely? Obtain the inspiration, more experiences, even more techniques, and also more understanding. And also where is the area to obtain it? Naturally, many areas ready colleges and also several points excel teacher for you. And publication, as the home window to obtain open the world turns into one of the choice that you should get. What sort of publication? Naturally the book that will certainly sustain related to your need.
A publication is much related to reviewing activities. Schedule will be absolutely nothing when none reads it. Checking out will not be finished when guide is just one of the topics. Nonetheless, in this modern-day period, the visibility of book is expanding sophisticatedly. Many sources make the both publication in printed and also soft file. Having the soft documents of publication will reduce you to make actual to read it. It can be saved in your numerous tool, computer system, CD, laptop, even the device that you always bring anywhere. It is why; we show you the soft documents of Auditing And Security: AS/400, NT, UNIX, Networks, And Disaster Recovery Plans as one of issue to read.
Regarding this book, everybody understands that it's really interesting publication. You may have sought for this publication in lots of shops. Have you got it? When you are run out of this publication to get, you can get it here. You know, getting Auditing And Security: AS/400, NT, UNIX, Networks, And Disaster Recovery Plans in this website will be much easier. No have to choose buying in book stores, strolling from one store to others, this is the internet that has checklists al book collections on the planet, primarily. The web links are provided for each book.
When his is the time for you to always make handle the feature of guide, you could make deal that the book is actually recommended for you to get the most effective idea. This is not just ideal suggestions to obtain the life yet additionally to undertake the life. The way of living is occasionally adapted the situation of perfections, yet it will be such thing to do. And currently, the book is one more time advised here to check out.
From the Inside Flap
According to law enforcement figures, American corporations lose billions of dollars a year due to IT security breaches. Auditing and Security: AS/400, NT, Unix, Networks, and Disaster Recovery Plans provides the tools that an auditor needs to ensure that a company's platforms and networks are adequately protected. Auditing information systems for security requires knowledge across a wide range of disciplines beyond computer science, including management science, information security, accounting, finance, business, and human resources. This book supplies the vital information across these divergent fields that auditors, IT managers, controllers, and CIOs need to measure the security of their systems. This comprehensive volume covers the full range of issues relating to security audits-hardware, operating systems, network connections, the cooperation of logical and physical security measures, and disaster recovery planning. The author begins with an overview of the structure of information systems and their security requirements and then shows you how physical and logical security systems work together to create a safe corporate information structure. Comprehensive treatment of the different structures and security needs of AS/400, Microsoft NT, and Unix allows you to understand security requirements regardless of which computer architecture a company runs. Auditing and Security also uses helpful checklists and diagrams and a practical, rather than theoretical, method for understanding hardware, operating systems, and the networks that enable the interconnection of platforms and applications. Another important topic this volume covers is disaster recovery planning to help you ensure that IT systems and the information they safeguard are recoverable in the event of a major disruption in service or intentional destruction of data. This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's various IT platforms-from the mainframe to the individual PC-as well as the networks that connect them to each other and to the global marketplace. Auditing and Security: AS/400, NT, Unix, Networks, and Disaster Recovery Plans is the first book on IT security written specifically for the auditor, detailing what controls are necessary to ensure a secure system regardless of the specific hardware, software, or architecture a company runs. For the companion Web site, please visit www.wiley.com/musaji.
Read more
From the Back Cover
A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect them to each other and to the global marketplace. Auditing and Security: AS/400, NT, Unix, Networks, and Disaster Recovery Plans is the first book on IT security written specifically for the auditor, detailing what controls are necessary to ensure a secure system regardless of the specific hardware, software, or architecture a company runs. The author uses helpful checklists and diagrams and a practical, rather than theoretical, method to understanding and auditing a company's IT security systems and their requirements. This comprehensive volume covers the full range of issues relating to security audits, including: * Hardware and software * Operating systems * Network connections * The cooperation of logical and physical security systems * Disaster recovery planning
Read more
See all Editorial Reviews
Product details
Hardcover: 552 pages
Publisher: Wiley; 1 edition (February 21, 2001)
Language: English
ISBN-10: 0471383716
ISBN-13: 978-0471383710
Product Dimensions:
7.3 x 1.4 x 10.4 inches
Shipping Weight: 2.8 pounds (View shipping rates and policies)
Average Customer Review:
1.0 out of 5 stars
2 customer reviews
Amazon Best Sellers Rank:
#1,792,644 in Books (See Top 100 in Books)
As an experienced Technology Auditor, I picked up this book to brush up on some of the considerations involved in auditing UNIX systems. After reading through most of the section on UNIX, I couldnt help but think that this book was written without considering the intended audience. Generally speaking, an IT Auditor has to be a jack-of-all-trades when it comes to systems, because it is extremely difficult to find a company that uses ONLY Unix, or ONLY Windows, or ONLY Linux. As a result, the IT Auditor has to know enough about each system to navigate through, but is not necessarily an expert in any of them.This book seems to be written for a security administrator, assuming that the reader knows the details of every command the system has to offer and offering little or no explanation as to what the command does. Convincing a system administrator to run a command that you, as the auditor, do not understand is potentially disasterous.Beyond that, typos and spelling errors within the commands (ex: using "is -1" instead of "ls -l" or "chcl" instead of "chacl"), are simply inexcusable for what they are charging for this book.
Because the book was published in 2001, and it used the AS/400 name in it's title, I expected it to be a good source on recent developments in security on the AS/400 (AKA the IBM iSeries). I am dissapointed. While the information that is included in the book seems generally accurate (I have a few quibbles in areas like QSECURITY, Adopted Authority, CHGSYSLIBL, and CRTAUT to name a few), the big problem is that there are huge chunks of current technologies that are not even addressed in this audit standard.Some examples include, the entire IFS (Integrated File System), Operations Navigator, NetServer and other network servers like SMTP, HTTP, FTP, etc. No reference to exit programs beyond the ancient PCSACC and DDMACC network attirbutes, spotty acknowledgement of System Values added after V3R1 (1995?) and a general lack of understanding of what the potential security exposures might be in areas that were audited. It's one thing to say that you should "discuss with management" the existance on a workstation entry in subsystem QDSNX, but what is an auditor to discuss if the author hasn't explained the potential security exposure?It may be a rally good book with respect ot the other OS's that it purports to cover, but from an OS/400 perspective it is not current enough to be very effective on modern versions.
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans PDF
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans EPub
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans Doc
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans iBooks
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans rtf
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans Mobipocket
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans Kindle
0 comments:
Post a Comment