logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans by Yusufali F. Musaji ISBN 9780471383710, 0471383716

  • SKU: EBN-1286762
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.7

37 reviews
Instant download (eBook) Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans after payment.
Authors:Yusufali F. Musaji
Pages:553 pages.
Year:2001
Editon:1
Publisher:Wiley
Language:english
File Size:13.48 MB
Format:pdf
ISBNS:9780471383710, 0471383716
Categories: Ebooks

Product desciption

(Ebook) Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans by Yusufali F. Musaji ISBN 9780471383710, 0471383716

As an experienced Technology Auditor, I picked up this book to brush up on some of the considerations involved in auditing UNIX systems. After reading through most of the section on UNIX, I couldnt help but think that this book was written without considering the intended audience. Generally speaking, an IT Auditor has to be a jack-of-all-trades when it comes to systems, because it is extremely difficult to find a company that uses ONLY Unix, or ONLY Windows, or ONLY Linux. As a result, the IT Auditor has to know enough about each system to navigate through, but is not necessarily an expert in any of them. This book seems to be written for a security administrator, assuming that the reader knows the details of every command the system has to offer and offering little or no explanation as to what the command does. Convincing a system administrator to run a command that you, as the auditor, do not understand is potentially disasterous. Beyond that, typos and spelling errors within the commands (ex: using "is -1" instead of "ls -l" or "chcl" instead of "chacl"), are simply inexcusable for what they are charging for this book.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products