The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
Guardat en:
Autor principal: | Gantz, Stephen D. |
---|---|
Altres autors: | Maske, Steve |
Format: | Electrònic eBook |
Idioma: | anglès |
Publicat: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
Col·lecció: | The basics
|
Matèries: | |
Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars
IT audit, control, and security
per: Moeller, Robert R.
Publicat: (2010)
per: Moeller, Robert R.
Publicat: (2010)
Nessus network auditing
per: Beale, Jay
Publicat: (2004)
per: Beale, Jay
Publicat: (2004)
Information getting, protecting and using data.
Publicat: (2003)
Publicat: (2003)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
per: Winterfeld, Steve
Publicat: (2013)
per: Winterfeld, Steve
Publicat: (2013)
Security and control in information systems a guide for business and accounting /
per: Hawker, Andrew
Publicat: (2000)
per: Hawker, Andrew
Publicat: (2000)
Information management & computer security.
Publicat: (2007)
Publicat: (2007)
Aspects of network and information security
Publicat: (2008)
Publicat: (2008)
Enterprise information security and privacy
Publicat: (2009)
Publicat: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
per: Alexander, Philip, 1963-
Publicat: (2008)
per: Alexander, Philip, 1963-
Publicat: (2008)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
per: Andress, Jason
Publicat: (2014)
per: Andress, Jason
Publicat: (2014)
Cyber adversary characterization auditing the hacker mind /
Publicat: (2004)
Publicat: (2004)
Web security basics
per: Bhasin, Shweta, 1977-
Publicat: (2003)
per: Bhasin, Shweta, 1977-
Publicat: (2003)
IT compliance and controls best practices for implementation /
per: DeLuccia, James J., 1977-
Publicat: (2008)
per: DeLuccia, James J., 1977-
Publicat: (2008)
Foundations of information technology /
per: Yadav, D. S.
Publicat: (2008)
per: Yadav, D. S.
Publicat: (2008)
Information technology network and internet
per: Bhunia, C. T.
Publicat: (2008)
per: Bhunia, C. T.
Publicat: (2008)
Data visualization.
Publicat: (2013)
Publicat: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
per: McIlwraith, Angus
Publicat: (2006)
per: McIlwraith, Angus
Publicat: (2006)
Turning heads and changing minds : transcending IT auditor archetypes /
per: Ee, Chong
Publicat: (2013)
per: Ee, Chong
Publicat: (2013)
The misuse of information systems the impact of security countermeasures /
per: D'Arcy, John P., 1975-
Publicat: (2007)
per: D'Arcy, John P., 1975-
Publicat: (2007)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
per: Mehan, Julie E.
Publicat: (2009)
per: Mehan, Julie E.
Publicat: (2009)
Computer and information security handbook
Publicat: (2009)
Publicat: (2009)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
per: Betz, Charles T.
Publicat: (2007)
per: Betz, Charles T.
Publicat: (2007)
The dark sides of the Internet : on cyber threats and information warfare /
per: Heickerö, Roland
Publicat: (2013)
per: Heickerö, Roland
Publicat: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
per: Kaeo, Merike
Publicat: (2004)
per: Kaeo, Merike
Publicat: (2004)
The basics of web hacking tools and techniques to attack the Web /
per: Pauli, Joshua J.
Publicat: (2013)
per: Pauli, Joshua J.
Publicat: (2013)
Security risk management building an information security risk management program from the ground up /
per: Wheeler, Evan
Publicat: (2011)
per: Wheeler, Evan
Publicat: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
per: Mularien, Peter
Publicat: (2010)
per: Mularien, Peter
Publicat: (2010)
Identity management concepts, technologies, and systems /
per: Bertino, Elisa
Publicat: (2011)
per: Bertino, Elisa
Publicat: (2011)
Information assurance dependability and security in networked systems /
Publicat: (2008)
Publicat: (2008)
SSL and TLS theory and practice /
per: Oppliger, Rolf
Publicat: (2009)
per: Oppliger, Rolf
Publicat: (2009)
Web commerce security design and development /
per: Nahari, Hadi
Publicat: (2011)
per: Nahari, Hadi
Publicat: (2011)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
per: Savoie, Michael J.
Publicat: (2012)
per: Savoie, Michael J.
Publicat: (2012)
Managing information security
Publicat: (2010)
Publicat: (2010)
Wars of disruption and resilience cybered conflict, power, and national security /
per: Demchak, Chris C.
Publicat: (2011)
per: Demchak, Chris C.
Publicat: (2011)
How to cheat at managing information security
per: Osborne, Mark
Publicat: (2006)
per: Osborne, Mark
Publicat: (2006)
Threat modeling : designing for security /
per: Shostack, Adam
Publicat: (2014)
per: Shostack, Adam
Publicat: (2014)
Ítems similars
-
IT audit, control, and security
per: Moeller, Robert R.
Publicat: (2010) -
Nessus network auditing
per: Beale, Jay
Publicat: (2004) -
Information getting, protecting and using data.
Publicat: (2003) -
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
per: Winterfeld, Steve
Publicat: (2013) -
Security and control in information systems a guide for business and accounting /
per: Hawker, Andrew
Publicat: (2000)