Information Systems Auditing

Saturday, January 12, 2013

Distributed & Local Computing

Labels: Ch5
Newer Post Older Post Home

Postings

  • ▼  13 (64)
    • ▼  Jan (64)
      • Introductory Overview
      • Information
      • Security
      • Approaches and Techniques to IT Security
      • Policies & Procedures
      • Governance
      • CAATS
      • Information System Auditing
      • IT Audit Planning
      • IT Audit Types
      • CAAT - Audit Analysis
      • Ethical Hacking
      • CobiT
      • ValIT
      • ISO 38500
      • Governance Strategy
      • Physical Protection
      • Information Security Management System
      • Access Security Devices
      • Logical Access Control
      • Computer Forensics
      • Processing & Connectivity
      • File Interrogations
      • Information Security Policies
      • Defence In Depth
      • System Development
      • Encryption
      • Password Management
      • Personnel Controls
      • Legislation & Regulation
      • Copyright Designs & Patent Act 1988
      • Data Protection Act 1998
      • Knowledge
      • E Commerce & E Commerce Security
      • IT Strategy
      • System Recovery
      • Back Up
      • Disaster Recovery
      • Business Continuity Planning
      • Application Controls
      • Monitoring Ideas
      • Segregation of Duties
      • Culture
      • Features Of A Good IT Security System
      • IT Equipment
      • Hardware
      • Firewalls
      • IT Roles
      • Operational Management
      • System Development Testing Phases
      • System Development Life Cycle
      • Types Of System Development
      • Features Of System Development
      • Projects
      • Distributed & Local Computing
      • Change Control
      • Capacity Management
      • Outsourcing
      • Managing Outsourcing Arrangements
      • Network Management
      • Networks
      • Software
      • Databases
      • Document Management

Search This Blog

Simple theme. Powered by Blogger.