IT Auditing: Using Controls to Protect Information Assets

Download IT Auditing: Using Controls to Protect Information Assets PDF Online Free

Author :
Publisher : McGraw Hill Professional
ISBN 13 : 0071631763
Total Pages : 417 pages
Book Rating : 4.0/5 (716 download)

DOWNLOAD NOW!


Book Synopsis IT Auditing: Using Controls to Protect Information Assets by : Chris Davis

Download or read book IT Auditing: Using Controls to Protect Information Assets written by Chris Davis and published by McGraw Hill Professional. This book was released on 2007-01-12 with total page 417 pages. Available in PDF, EPUB and Kindle. Book excerpt: Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value Implement best practice IT audit processes and controls Analyze UNIX-, Linux-, and Windows-based operating systems Audit network routers, switches, firewalls, WLANs, and mobile devices Evaluate entity-level controls, data centers, and disaster recovery plans Examine Web servers, platforms, and applications for vulnerabilities Review databases for critical controls Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies Implement sound risk analysis and risk management practices Drill down into applications to find potential control weaknesses

IT Audit, Control, and Security

Download IT Audit, Control, and Security PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 0470877685
Total Pages : 696 pages
Book Rating : 4.4/5 (78 download)

DOWNLOAD NOW!


Book Synopsis IT Audit, Control, and Security by : Robert R. Moeller

Download or read book IT Audit, Control, and Security written by Robert R. Moeller and published by John Wiley & Sons. This book was released on 2010-10-12 with total page 696 pages. Available in PDF, EPUB and Kindle. Book excerpt: When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Information Technology Auditing

Download Information Technology Auditing PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3540274863
Total Pages : 246 pages
Book Rating : 4.5/5 (42 download)

DOWNLOAD NOW!


Book Synopsis Information Technology Auditing by : Jagdish Pathak

Download or read book Information Technology Auditing written by Jagdish Pathak and published by Springer Science & Business Media. This book was released on 2005-08-15 with total page 246 pages. Available in PDF, EPUB and Kindle. Book excerpt: An evolving agenda of Information Technology Auditing is subject of this book. The author presents various current and future issues in the domain of IT Auditing in both scholarly as well as highly practice-driven manner so as to make those issues clear in the mind of an IT auditor. The aim of the book is not to delve deep on the technologies but the impact of these technologies on practices and procedures of IT auditors. Among the topics are complex integrated information systems, enterprise resource planning, databases, complexities of internal controls, and enterprise application integration - all seen from an auditor's perspective. The book will serve a big purpose of support reference for an auditor dealing with the high-tech environment for the first time, but also for experienced auditors.

Auditor's Guide to Information Systems Auditing

Download Auditor's Guide to Information Systems Auditing PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 0470127031
Total Pages : 510 pages
Book Rating : 4.4/5 (71 download)

DOWNLOAD NOW!


Book Synopsis Auditor's Guide to Information Systems Auditing by : Richard E. Cascarino

Download or read book Auditor's Guide to Information Systems Auditing written by Richard E. Cascarino and published by John Wiley & Sons. This book was released on 2007-06-15 with total page 510 pages. Available in PDF, EPUB and Kindle. Book excerpt: Praise for Auditor's Guide to Information Systems Auditing "Auditor's Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible-reading it will enable them to learn what the role of auditors really is and will convey to them what they must know, understand, and look for when performing audits. For experiencedauditors, this book will serve as a reality check to determine whether they are examining the right issues and whether they are being sufficiently comprehensive in their focus. Richard Cascarino has done a superb job." —E. Eugene Schultz, PhD, CISSP, CISM Chief Technology Officer and Chief Information Security Officer, High Tower Software A step-by-step guide tosuccessful implementation and control of information systems More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types of organizations. However, many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Auditor's Guide to Information Systems Auditing presents an easy, practical guide for auditors that can be applied to all computing environments. As networks and enterprise resource planning systems bring resources together, and as increasing privacy violations threaten more organization, information systems integrity becomes more important than ever. With a complimentary student'sversion of the IDEA Data Analysis Software CD, Auditor's Guide to Information Systems Auditing empowers auditors to effectively gauge the adequacy and effectiveness of information systems controls.

Nessus Network Auditing

Download Nessus Network Auditing PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080558658
Total Pages : 448 pages
Book Rating : 4.0/5 (85 download)

DOWNLOAD NOW!


Book Synopsis Nessus Network Auditing by : Russ Rogers

Download or read book Nessus Network Auditing written by Russ Rogers and published by Elsevier. This book was released on 2011-10-13 with total page 448 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. - Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. - The first edition is still the only book available on the product. - Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

Information System Audit

Download Information System Audit PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 100061039X
Total Pages : 271 pages
Book Rating : 4.0/5 (6 download)

DOWNLOAD NOW!


Book Synopsis Information System Audit by : Philippe Peret

Download or read book Information System Audit written by Philippe Peret and published by CRC Press. This book was released on 2022-07-07 with total page 271 pages. Available in PDF, EPUB and Kindle. Book excerpt: The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitors. They have to review their organization, their processes, and their way of working. This also concerns auditors in terms of their audit strategy and working methods. Digitalization is the tip of the iceberg that represents the increasing reliance on information technology of the company’s information system. Companies have seen new competitors succeed with a digital approach, competitors that have opened new markets or new ways of interacting with their customers, and all business processes can be digitalized. In this new paradigm, auditors have to renew themselves too. Long gone are the days of auditors specializing in one technique, like financial auditors or IT auditors. This makes it a phenomenal opportunity for auditing to renew itself, embracing the vision of the company’s information system: long live the information system auditors! This book proposes you to go step by step from a common understanding of our history of auditing to gradually defining and justifying the impacts of digitalization on the audit strategy and the preparation of audits.

The Hacker's Handbook

Download The Hacker's Handbook PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 0203490045
Total Pages : 896 pages
Book Rating : 4.2/5 (34 download)

DOWNLOAD NOW!


Book Synopsis The Hacker's Handbook by : Susan Young

Download or read book The Hacker's Handbook written by Susan Young and published by CRC Press. This book was released on 2003-11-24 with total page 896 pages. Available in PDF, EPUB and Kindle. Book excerpt: This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Securing an IT Organization through Governance, Risk Management, and Audit

Download Securing an IT Organization through Governance, Risk Management, and Audit PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1040070957
Total Pages : 239 pages
Book Rating : 4.0/5 (4 download)

DOWNLOAD NOW!


Book Synopsis Securing an IT Organization through Governance, Risk Management, and Audit by : Ken E. Sigler

Download or read book Securing an IT Organization through Governance, Risk Management, and Audit written by Ken E. Sigler and published by CRC Press. This book was released on 2016-01-05 with total page 239 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book maps the CSF steps and activities to the methods defined in COBIT 5, extending the CSF objectives with practical and measurable activities that leverage operational risk understanding in a business context. This allows the ICT organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

Download IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738435880
Total Pages : 494 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite by : Axel Buecker

Download or read book IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite written by Axel Buecker and published by IBM Redbooks. This book was released on 2011-08-18 with total page 494 pages. Available in PDF, EPUB and Kindle. Book excerpt: Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

Learning Puppet Security

Download Learning Puppet Security PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1784398896
Total Pages : 236 pages
Book Rating : 4.7/5 (843 download)

DOWNLOAD NOW!


Book Synopsis Learning Puppet Security by : Jason Slagle

Download or read book Learning Puppet Security written by Jason Slagle and published by Packt Publishing Ltd. This book was released on 2015-03-27 with total page 236 pages. Available in PDF, EPUB and Kindle. Book excerpt: If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

Enterprise Security Architecture Using IBM Tivoli Security Solutions

Download Enterprise Security Architecture Using IBM Tivoli Security Solutions PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738486418
Total Pages : 1076 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Enterprise Security Architecture Using IBM Tivoli Security Solutions by : Axel Buecker

Download or read book Enterprise Security Architecture Using IBM Tivoli Security Solutions written by Axel Buecker and published by IBM Redbooks. This book was released on 2007-08-07 with total page 1076 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges. This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.

The IT Regulatory and Standards Compliance Handbook

Download The IT Regulatory and Standards Compliance Handbook PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080560172
Total Pages : 758 pages
Book Rating : 4.0/5 (85 download)

DOWNLOAD NOW!


Book Synopsis The IT Regulatory and Standards Compliance Handbook by : Craig S. Wright

Download or read book The IT Regulatory and Standards Compliance Handbook written by Craig S. Wright and published by Elsevier. This book was released on 2008-07-25 with total page 758 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs. - The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them - The most comprehensive IT compliance template available, giving detailed information on testing all your IT security, policy and governance requirements - A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement - Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book - This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues

Auditing Final Approach

Download Auditing Final Approach PDF Online Free

Author :
Publisher : Juta and Company Ltd
ISBN 13 : 9780702143564
Total Pages : 484 pages
Book Rating : 4.1/5 (435 download)

DOWNLOAD NOW!


Book Synopsis Auditing Final Approach by : Elmarie Sadler

Download or read book Auditing Final Approach written by Elmarie Sadler and published by Juta and Company Ltd. This book was released on 1998-02-27 with total page 484 pages. Available in PDF, EPUB and Kindle. Book excerpt: This text covers the responsibilities, functions and qualities of the independent auditor, the audit process and reporting. Topics examined include assertions in financial statements, audit evidence, audit planning, specific control problems and audit sampling.

Auditing Information Systems and Controls

Download Auditing Information Systems and Controls PDF Online Free

Author :
Publisher : Xlibris Corporation
ISBN 13 : 1465324151
Total Pages : 239 pages
Book Rating : 4.4/5 (653 download)

DOWNLOAD NOW!


Book Synopsis Auditing Information Systems and Controls by : Ed Danter

Download or read book Auditing Information Systems and Controls written by Ed Danter and published by Xlibris Corporation. This book was released on 2007-06-22 with total page 239 pages. Available in PDF, EPUB and Kindle. Book excerpt: Corporate America is faced with a challenge today, a challenge unprecedented in our history. It has become a national imperative that corporations create audit programs and infrastructures to achieve audit readiness and guarantee the accuracy of corporate records. Executives should not and can not depend entirely on external audit reviews and recommendations. They must create internal audit programs and infrastructures to regain credibility and the confidence of shareholders. Meeting this challenge is critical to the survival and success of many business enterprises. The federal government and leaders of our country are serious today in facing the challenges of corporate behavior and the dangers that have evolved, evidenced by the passing of the Sarbanes Oxley Act of 2002. The Act requires the certification by CEOs and CFOs regarding the accuracy of their financial statements and requires independent outside audit attestation of the operating effectiveness of controls and control structure over financial reporting. It imposes associated penalties for failure to comply. Pro-active corporations must establish the discipline of rigorous audit readiness programs and must ensure their continued successful execution. It is essential that internal audit committees take measures to install checks and balances and self-policing practices to ensure integrity within their corporations. This is not optional. CEOs today are legally responsible for the correctness of their financial statements. IT Governance: The Only Thing Worse Than No Control Is The Illusion of Control focuses on a unique organizational structure and the mechanics of establishing an effective internal independent audit organization. It proposes the structure of an independent internal auditing group headed by a Chief Governance Officer (CGO) or Chief Accounting Executive (CAE) who reports directly to an audit committee, comprised of Board of Director members, who themselves must be totally independent. Independence is the most critical element in the success of this new audit approach and can not be emphasized enough. This will require an organizational change in most corporations and a revolutionary approach. Old paradigms in which the audit organization reported to the CEO or CFO will be discarded. These internal audit groups must serve as the eyes and ears for the public and Board of Directors. They will provide early warnings of inappropriate, fraudulent or ineffective practices and will report noncompliance with accepted basic control fundamentals and ethical behavior; they must do so without fear of reprisal. Not only is it the responsibility of the Audit Committee to provide direction, but it is essential that every executive officer and their staffs be on board and be fully supportive of the internal audit infrastructure. It is the synergy of these organizations working together that is required to prepare us for successful audits and to improve business controls. Education is critical and should be of paramount importance in addressing this problem. IT Governance: The Only Thing Worse Than No Control Is The Illusion of Control addresses the establishment of effective corporate governance, describes how to install a sound audit governance infrastructure, and describes how to establish effective IT controls. We have an opportunity to do better and we should. This book addresses not only how to comply with legislative mandates, but it also provides a roadmap, detailing steps on how to establish an infrastructure and audit readiness program to achieve compliance. In addition, there is a realization now by many corporations that the effectiveness of their business process controls is heavily dependent on the adequacy of their IT controls; this book focuses on the integration of business processes with IT controls. This book addresses many facets of IT controls, from the formation of an effective audit infrastru

CISA Certified Information Systems Auditor Study Guide

Download CISA Certified Information Systems Auditor Study Guide PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 111803368X
Total Pages : 700 pages
Book Rating : 4.1/5 (18 download)

DOWNLOAD NOW!


Book Synopsis CISA Certified Information Systems Auditor Study Guide by : David L. Cannon

Download or read book CISA Certified Information Systems Auditor Study Guide written by David L. Cannon and published by John Wiley & Sons. This book was released on 2011-03-04 with total page 700 pages. Available in PDF, EPUB and Kindle. Book excerpt: The industry-leading study guide for the CISA exam, fully updated More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated twice a year, and this is the most up-to-date book available to prepare aspiring CISAs for the next exam. CISAs are among the five highest-paid IT security professionals; more than 27,000 take the exam each year and the numbers are growing Standards are updated twice a year, and this book offers the most up-to-date coverage as well as the proven Sybex approach that breaks down the content, tasks, and knowledge areas of the exam to cover every detail Covers the IS audit process, IT governance, systems and infrastructure lifecycle management, IT service delivery and support, protecting information assets, disaster recovery, and more Anyone seeking Certified Information Systems Auditor status will be fully prepared for the exam with the detailed information and approach found in this book. CD-ROM/DVD and other supplementary materials are not included as part of the e-book file, but are available for download after purchase

Graded Tutorials on Auditing

Download Graded Tutorials on Auditing PDF Online Free

Author :
Publisher : Juta and Company Ltd
ISBN 13 : 9780702172038
Total Pages : 732 pages
Book Rating : 4.1/5 (72 download)

DOWNLOAD NOW!


Book Synopsis Graded Tutorials on Auditing by : Peter Bourne

Download or read book Graded Tutorials on Auditing written by Peter Bourne and published by Juta and Company Ltd. This book was released on 2006 with total page 732 pages. Available in PDF, EPUB and Kindle. Book excerpt: The tutorial questions in this sixth edition cover the latest auditing syllabi of the South African Institute of Chartered Accountants (Part 1 of the Qualifying Examination) and the Public Accountants' and Auditors' Board (Part 2 of the Qualifying Examination -- Audit specialisation). Hundreds of questions span various topics and are graded into three categories according to their levels of difficulty, in compliance with the South African accounting profession's definition of levels of knowledge: B: Basic (Level 1: Knowledge and comprehension) I: Intermediate (Level 2: Application) A: Advanced (Level 3: Integration). The sequence of questions in each section runs from basic through intermediate to advanced.

Handbook of Heterogeneous Networking

Download Handbook of Heterogeneous Networking PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1351089528
Total Pages : 1371 pages
Book Rating : 4.3/5 (51 download)

DOWNLOAD NOW!


Book Synopsis Handbook of Heterogeneous Networking by : Raj Rajgopal

Download or read book Handbook of Heterogeneous Networking written by Raj Rajgopal and published by CRC Press. This book was released on 2018-01-31 with total page 1371 pages. Available in PDF, EPUB and Kindle. Book excerpt: Here is all the practical, hands-on information you need to build, manage and maintain a heterogeneous computing environment with hardware, software, and network equipment from a number of different vendors. Packed with real-world case studies and proven techniques for integrating disparate platforms, operating systems and servers, Handbook of Heterogeneous Computing is a one-stop, non-nonsense guide that shows you how to: * port and develop applications in a heterogeneous environment * manage desktops, data access, communications, and security in a heterogeneous environment * and build distributed heterogeneous systems What is best for your installation? Should you standardize on the Windows environment for both production applications and office applications? Should you adopt the Windows NT workstation as a standard desktop and use Windows NT as the network operating system? Handbook of Heterogeneous Computing details the advantages and disadvantages of these and other approaches. The book also explains: * the arts of porting and developing applications in a heterogeneous environment using Java, CGI/Perl, and other tools * how to build interfaces with mainframe legacy systems * how to use CORBA to integrate distributed database systems while at the same time managing database gateways and interoperability * how to manage interlan switching, multicast networking structures, SNA-LAN integration, and all aspects of enterprise networks * and how to use Kerberos, firewalls, PGP, RSA public keys, and other tools to assure security in heterogeneous environments. Heterogeneous computing is here to stay. It is therefore up to corporate end-users to make competing products fit into their environments efficiently, effectively and economically. Handbook of Heterogeneous Computing gives you t