Audit and Trace Log Management

Audit and Trace Log Management

Author: Phillip Q. Maier

Publisher: CRC Press

Published: 2006-04-05

Total Pages: 187

ISBN-13: 0203491769

DOWNLOAD EBOOK

As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and Analysis offers a comprehensive introduction and explanation of requirements and problem definition, and also delivers a multidimensional solution


Guide to Computer Security Log Management

Guide to Computer Security Log Management

Author: Karen Kent

Publisher:

Published: 2007-08-01

Total Pages: 72

ISBN-13: 9781422312919

DOWNLOAD EBOOK

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). These CS logs are generated by many sources, incl. CS software, such as antivirus software, firewalls, & intrusion detection & prevention systems; operating systems on servers, workstations, & networking equip.; & applications. The no., vol., & variety of CS logs have increased greatly, which has created the need for CS log mgmt. -- the process for generating, transmitting, storing, analyzing, & disposing of CS data. This report assists org¿s. in understanding the need for sound CS log mgmt. It provides practical, real-world guidance on developing, implementing, & maintaining effective log mgmt. practices. Illus.


Organizational Crisis Management

Organizational Crisis Management

Author: Gerald Lewis

Publisher: CRC Press

Published: 2006-03-28

Total Pages: 207

ISBN-13: 1420013181

DOWNLOAD EBOOK

Organizational Crisis Management: The Human Factor offers theoretical background and practical strategies for responding to workplace crises. Responding to a paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reacti


Information Security Cost Management

Information Security Cost Management

Author: Ioana V. Bazavan

Publisher: CRC Press

Published: 2006-08-30

Total Pages: 278

ISBN-13: 1420013831

DOWNLOAD EBOOK

While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real


Crisis Management Planning and Execution

Crisis Management Planning and Execution

Author: Edward S. Devlin

Publisher: CRC Press

Published: 2006-12-26

Total Pages: 528

ISBN-13: 0203485890

DOWNLOAD EBOOK

Crisis management planning refers to the methodology used by executives to respond to and manage a crisis and is an integral part of a business resumption plan. Crisis Management Planning and Execution explores in detail the concepts of crisis management planning, which involves a number of crises other than physical disaster. Defining th


Federal Information System Controls Audit Manual (FISCAM)

Federal Information System Controls Audit Manual (FISCAM)

Author: Robert F. Dacey

Publisher: DIANE Publishing

Published: 2010-11

Total Pages: 601

ISBN-13: 1437914063

DOWNLOAD EBOOK

FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.


The Audit Society

The Audit Society

Author: Michael Power

Publisher: OUP Oxford

Published: 1999-08-19

Total Pages: 208

ISBN-13: 019103746X

DOWNLOAD EBOOK

Since the early 1980s there has been an explosion of auditing activity in the United Kingdom and North America. In addition to financial audits there are now medical audits, technology audits, value for money audits, environmental audits, quality audits, teaching audits, and many others. Why has this happened? What does it mean when a society invests so heavily in an industry of checking and when more and more individuals find themselves subject to formal scrutiny? The Audit Society argues that the rise of auditing has its roots in political demands for accountability and control. At the heart of a new administrative style internal control systems have begun to play an important public role and individual and organizational performance has been increasingly formalized and made auditable. Michael Power argues that the new demands and expectations of audits live uneasily with their operational capabilities. Not only is the manner in which they produce assurance and accountability open to question but also, by imposing their own values, audits often have unintended and dysfunctional consequences for the audited organization.


Information Security Management Handbook

Information Security Management Handbook

Author: Harold F. Tipton

Publisher: CRC Press

Published: 2007-05-14

Total Pages: 3280

ISBN-13: 1439833036

DOWNLOAD EBOOK

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the C


Linking Auditing and Meta-Evaluation

Linking Auditing and Meta-Evaluation

Author: Thomas A. Schwandt

Publisher: SAGE Publications, Incorporated

Published: 1988-06

Total Pages: 168

ISBN-13:

DOWNLOAD EBOOK

The emergence of new evaluation paradigms raises serious questions about how merit can be established and judged. Linking Auditing and Metaevaluation addresses this concern, introducing a strategy by which the quality of inquiry procedures and products can be assured and retrospectively assessed. Based upon the model of fiscal auditing, the technique is applicable to a variety of social scientific investigations and specifically includes non - conventional paradigms such as naturalistic evaluation. Effective regardless of the nature of the inquiry, auditing is also an excellent means of organizing data, thus promoting theorizing and identification of relationships in that data. Each section includes exercises designed both to encoura


IBM Systems Director Management Console: Introduction and Overview

IBM Systems Director Management Console: Introduction and Overview

Author: Scott Vetter

Publisher: IBM Redbooks

Published: 2011-09-22

Total Pages: 436

ISBN-13: 0738435449

DOWNLOAD EBOOK

This IBM® Redbooks® publication positions the IBM Systems Director Management Console (SDMC) against the IBM Hardware Management Console (HMC). The IBM Systems Director Management Console provides system administrators the ability to manage IBM Power System® servers as well as IBM Power Blade servers. It is based on IBM Systems Director. This publication is designed for system administrators to use as a deskside reference when managing Virtual Servers (formerly partitions) using the SDMC. The major functions that the SDMC provides are server hardware management and virtualization management.