The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
Sábháilte in:
Príomhchruthaitheoir: | Gantz, Stephen D. |
---|---|
Rannpháirtithe: | Maske, Steve |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
Sraith: | The basics
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
IT audit, control, and security
de réir: Moeller, Robert R.
Foilsithe / Cruthaithe: (2010)
de réir: Moeller, Robert R.
Foilsithe / Cruthaithe: (2010)
Nessus network auditing
de réir: Beale, Jay
Foilsithe / Cruthaithe: (2004)
de réir: Beale, Jay
Foilsithe / Cruthaithe: (2004)
Information getting, protecting and using data.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
Information management & computer security.
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Security and control in information systems a guide for business and accounting /
de réir: Hawker, Andrew
Foilsithe / Cruthaithe: (2000)
de réir: Hawker, Andrew
Foilsithe / Cruthaithe: (2000)
Aspects of network and information security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Enterprise information security and privacy
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
de réir: Alexander, Philip, 1963-
Foilsithe / Cruthaithe: (2008)
de réir: Alexander, Philip, 1963-
Foilsithe / Cruthaithe: (2008)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014)
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014)
Cyber adversary characterization auditing the hacker mind /
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Web security basics
de réir: Bhasin, Shweta, 1977-
Foilsithe / Cruthaithe: (2003)
de réir: Bhasin, Shweta, 1977-
Foilsithe / Cruthaithe: (2003)
IT compliance and controls best practices for implementation /
de réir: DeLuccia, James J., 1977-
Foilsithe / Cruthaithe: (2008)
de réir: DeLuccia, James J., 1977-
Foilsithe / Cruthaithe: (2008)
Foundations of information technology /
de réir: Yadav, D. S.
Foilsithe / Cruthaithe: (2008)
de réir: Yadav, D. S.
Foilsithe / Cruthaithe: (2008)
Information technology network and internet
de réir: Bhunia, C. T.
Foilsithe / Cruthaithe: (2008)
de réir: Bhunia, C. T.
Foilsithe / Cruthaithe: (2008)
Data visualization.
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
de réir: McIlwraith, Angus
Foilsithe / Cruthaithe: (2006)
de réir: McIlwraith, Angus
Foilsithe / Cruthaithe: (2006)
The misuse of information systems the impact of security countermeasures /
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
de réir: Mehan, Julie E.
Foilsithe / Cruthaithe: (2009)
de réir: Mehan, Julie E.
Foilsithe / Cruthaithe: (2009)
Turning heads and changing minds : transcending IT auditor archetypes /
de réir: Ee, Chong
Foilsithe / Cruthaithe: (2013)
de réir: Ee, Chong
Foilsithe / Cruthaithe: (2013)
Computer and information security handbook
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
de réir: Betz, Charles T.
Foilsithe / Cruthaithe: (2007)
de réir: Betz, Charles T.
Foilsithe / Cruthaithe: (2007)
The dark sides of the Internet : on cyber threats and information warfare /
de réir: Heickerö, Roland
Foilsithe / Cruthaithe: (2013)
de réir: Heickerö, Roland
Foilsithe / Cruthaithe: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
The basics of web hacking tools and techniques to attack the Web /
de réir: Pauli, Joshua J.
Foilsithe / Cruthaithe: (2013)
de réir: Pauli, Joshua J.
Foilsithe / Cruthaithe: (2013)
Security risk management building an information security risk management program from the ground up /
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
Identity management concepts, technologies, and systems /
de réir: Bertino, Elisa
Foilsithe / Cruthaithe: (2011)
de réir: Bertino, Elisa
Foilsithe / Cruthaithe: (2011)
Information assurance dependability and security in networked systems /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
SSL and TLS theory and practice /
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2009)
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2009)
Web commerce security design and development /
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
de réir: Savoie, Michael J.
Foilsithe / Cruthaithe: (2012)
de réir: Savoie, Michael J.
Foilsithe / Cruthaithe: (2012)
Managing information security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
How to cheat at managing information security
de réir: Osborne, Mark
Foilsithe / Cruthaithe: (2006)
de réir: Osborne, Mark
Foilsithe / Cruthaithe: (2006)
Wars of disruption and resilience cybered conflict, power, and national security /
de réir: Demchak, Chris C.
Foilsithe / Cruthaithe: (2011)
de réir: Demchak, Chris C.
Foilsithe / Cruthaithe: (2011)
Threat modeling : designing for security /
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
Network security /
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
Invasion of privacy! big brother and the company hackers /
de réir: Weber, Michael
Foilsithe / Cruthaithe: (2004)
de réir: Weber, Michael
Foilsithe / Cruthaithe: (2004)
Silence on the wire a field guide to passive reconnaissance and indirect attacks /
de réir: Zalewski, Michal
Foilsithe / Cruthaithe: (2005)
de réir: Zalewski, Michal
Foilsithe / Cruthaithe: (2005)
Míreanna comhchosúla
-
IT audit, control, and security
de réir: Moeller, Robert R.
Foilsithe / Cruthaithe: (2010) -
Nessus network auditing
de réir: Beale, Jay
Foilsithe / Cruthaithe: (2004) -
Information getting, protecting and using data.
Foilsithe / Cruthaithe: (2003) -
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013) -
Information management & computer security.
Foilsithe / Cruthaithe: (2007)