The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
Gardado en:
Autor Principal: | Gantz, Stephen D. |
---|---|
Outros autores: | Maske, Steve |
Formato: | Electrónico eBook |
Idioma: | inglés |
Publicado: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
Series: | The basics
|
Subjects: | |
Acceso en liña: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Títulos similares
IT audit, control, and security
por: Moeller, Robert R.
Publicado: (2010)
por: Moeller, Robert R.
Publicado: (2010)
Nessus network auditing
por: Beale, Jay
Publicado: (2004)
por: Beale, Jay
Publicado: (2004)
Information getting, protecting and using data.
Publicado: (2003)
Publicado: (2003)
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado: (2000)
por: Hawker, Andrew
Publicado: (2000)
Information management & computer security.
Publicado: (2007)
Publicado: (2007)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado: (2013)
por: Winterfeld, Steve
Publicado: (2013)
Aspects of network and information security
Publicado: (2008)
Publicado: (2008)
Enterprise information security and privacy
Publicado: (2009)
Publicado: (2009)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
por: Andress, Jason
Publicado: (2014)
por: Andress, Jason
Publicado: (2014)
Information security a manager's guide to thwarting data thieves and hackers /
por: Alexander, Philip, 1963-
Publicado: (2008)
por: Alexander, Philip, 1963-
Publicado: (2008)
Foundations of information technology /
por: Yadav, D. S.
Publicado: (2008)
por: Yadav, D. S.
Publicado: (2008)
Turning heads and changing minds : transcending IT auditor archetypes /
por: Ee, Chong
Publicado: (2013)
por: Ee, Chong
Publicado: (2013)
Information technology network and internet
por: Bhunia, C. T.
Publicado: (2008)
por: Bhunia, C. T.
Publicado: (2008)
Web security basics
por: Bhasin, Shweta, 1977-
Publicado: (2003)
por: Bhasin, Shweta, 1977-
Publicado: (2003)
IT compliance and controls best practices for implementation /
por: DeLuccia, James J., 1977-
Publicado: (2008)
por: DeLuccia, James J., 1977-
Publicado: (2008)
Cyber adversary characterization auditing the hacker mind /
Publicado: (2004)
Publicado: (2004)
Data visualization.
Publicado: (2013)
Publicado: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
por: McIlwraith, Angus
Publicado: (2006)
por: McIlwraith, Angus
Publicado: (2006)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
por: Mehan, Julie E.
Publicado: (2009)
por: Mehan, Julie E.
Publicado: (2009)
The misuse of information systems the impact of security countermeasures /
por: D'Arcy, John P., 1975-
Publicado: (2007)
por: D'Arcy, John P., 1975-
Publicado: (2007)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
por: Betz, Charles T.
Publicado: (2007)
por: Betz, Charles T.
Publicado: (2007)
Computer and information security handbook
Publicado: (2009)
Publicado: (2009)
The basics of web hacking tools and techniques to attack the Web /
por: Pauli, Joshua J.
Publicado: (2013)
por: Pauli, Joshua J.
Publicado: (2013)
The dark sides of the Internet : on cyber threats and information warfare /
por: Heickerö, Roland
Publicado: (2013)
por: Heickerö, Roland
Publicado: (2013)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
por: Savoie, Michael J.
Publicado: (2012)
por: Savoie, Michael J.
Publicado: (2012)
Designing network security : a practical guide to creating a secure network infrastructure /
por: Kaeo, Merike
Publicado: (2004)
por: Kaeo, Merike
Publicado: (2004)
Security risk management building an information security risk management program from the ground up /
por: Wheeler, Evan
Publicado: (2011)
por: Wheeler, Evan
Publicado: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
por: Mularien, Peter
Publicado: (2010)
por: Mularien, Peter
Publicado: (2010)
Information assurance dependability and security in networked systems /
Publicado: (2008)
Publicado: (2008)
Identity management concepts, technologies, and systems /
por: Bertino, Elisa
Publicado: (2011)
por: Bertino, Elisa
Publicado: (2011)
SSL and TLS theory and practice /
por: Oppliger, Rolf
Publicado: (2009)
por: Oppliger, Rolf
Publicado: (2009)
Web commerce security design and development /
por: Nahari, Hadi
Publicado: (2011)
por: Nahari, Hadi
Publicado: (2011)
Managing information security
Publicado: (2010)
Publicado: (2010)
Dictionary of information security
por: Slade, Robert
Publicado: (2006)
por: Slade, Robert
Publicado: (2006)
Wars of disruption and resilience cybered conflict, power, and national security /
por: Demchak, Chris C.
Publicado: (2011)
por: Demchak, Chris C.
Publicado: (2011)
How to cheat at managing information security
por: Osborne, Mark
Publicado: (2006)
por: Osborne, Mark
Publicado: (2006)
Security data visualization graphical techniques for network analysis /
por: Conti, Greg
Publicado: (2007)
por: Conti, Greg
Publicado: (2007)
Threat modeling : designing for security /
por: Shostack, Adam
Publicado: (2014)
por: Shostack, Adam
Publicado: (2014)
Network security /
por: Perez, Andre
Publicado: (2014)
por: Perez, Andre
Publicado: (2014)
Computer security fundamentals /
por: Easttom, Chuck
Publicado: (2006)
por: Easttom, Chuck
Publicado: (2006)
Títulos similares
-
IT audit, control, and security
por: Moeller, Robert R.
Publicado: (2010) -
Nessus network auditing
por: Beale, Jay
Publicado: (2004) -
Information getting, protecting and using data.
Publicado: (2003) -
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado: (2000) -
Information management & computer security.
Publicado: (2007)