Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

HP Non-Stop (Tandem)

Welcome to the HP Non-Stop (Tandem) l topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
76 Members
0 Online
5051 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 4 total

Must be a Topic member to contribute
As a matter of interest, has your organisation developed or migrated any apps from other platforms to Open System Services (i.e. a Unix-like environment) on Tandem? The company I used to work before had only installed and operated the iTP WebServer softwa...
Nikos | 9/15/2015 2:50:41 AM | COMMENTS(2)
In previous HP NonStop audits or security reviews of the Guardian/OSS (incl. NonStop System Console) I used as a guidance the excellent books published by Xypro such as: HP NonStop Server Security: http://www.amazon.com/NonStop-Server-Security-Practical-...
Nikos | 9/23/2014 3:49:32 AM | COMMENTS(5)
I recently joined an organisation using HP non-stop technology and I'm still trying to get my head round the authentication mechanism and the connectivity mechanism. From what I understand; Authentication Undertaken by Guardian (additionally we use SafeG...
ShirkerUK | 6/25/2013 6:02:09 AM | COMMENTS(0)
I just finished an audit review of the NS2000 file access security and I was curious if anyone else had audited this before or if anyone would want to compare audit programs.  While I found the security settings similar to Unix it also had some unique com...
etr71448 | 1/7/2012 4:58:53 AM | COMMENTS(1)

Documents & Publications: 40 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 37 days ago
Books
Posted by ISACA 1118 days ago
Research
Posted by ISACA 1138 days ago
Downloads
Posted by ISACA 1328 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 60 total

Volume 6, 2017
by ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
This book is an ideal handbook for auditors, database administrators (DBAs) and security practitioners who would like detailed insight on Oracle database security.
Volume 6, 2017
by Marcin Jekot, CISSO, ISO 27001 LA, SSP and Yiannis Pavlosoglou, Ph.D., CISSP
Never has such an abstract concept of “things” taken to the consumer market so quickly. From printers to thermostats to washing machines and cars, devices are being rushed and fitted with wireless interfaces.
Volume 4, 2017
by Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL v3, PMP
The root causes of privacy incidents include the outsourcing of data, malicious insiders, system glitches, cyberattacks, and the failure to shred or dispose of privacy data properly.
Volume 4, 2017
by Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP
In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.
Volume 4, 2017
by Sri Mallur
Industrial control systems (ICSs) are changing by relying more on off-the-shelf information technology (IT), thereby exposing these systems to more IT risk.
Volume 3, 2017
by Kurt Kincaid, CISA, Lean Six Sigma Green Belt
What follows is a discussion of the nature of HTTPS, how it should be configured, and how to remotely assess that configuration for oneself, rather than relying on verbal or written attestation from server or application administrators.

Wikis: 2 total

Blog Posts: 105 total

21 Feb 2018
We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This the first time to speak about ISACA Value in Iraq.Professional from government and private sector were excited to hear about ISACA value and they started to...
Posted By : Ali099 | 1 comments
Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 2 comments
There are some math models for business that MBAs are taught. Just like assembling burgers for fast food or call wait queue management in a call center, vulnerability patching is a time based business opportunity. Leadership can be expected to use this ...
Posted By : Don Turnblade | 1 comments
I predict that on 1 July 2018, I will be calmly eating a barbecue sandwich, talking with friends and possibly, I will burn a copy of the RFC2246: TLS version 1.0 standard for entertainment value.  Those will less effective Vendor, Network, Systems, Applic...
Posted By : Don Turnblade | 0 comments
https://www.linkedin.com/learning/it-security-careers-and-certifications-first-steps?trk=voyager_feed_cymbii_learning
Posted By : TafadzwaPadare | 1 comments
Greetings, is there any member currently studying for their CISA examination so that we can join hands and work together?
Posted By : TafadzwaPadare | 0 comments