The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
Spremljeno u:
Glavni autor: | Gantz, Stephen D. |
---|---|
Daljnji autori: | Maske, Steve |
Format: | Elektronički e-knjiga |
Jezik: | engleski |
Izdano: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
Serija: | The basics
|
Teme: | |
Online pristup: | An electronic book accessible through the World Wide Web; click to view |
Oznake: |
Dodaj oznaku
Bez oznaka, Budi prvi tko označuje ovaj zapis!
|
Slični predmeti
IT audit, control, and security
od: Moeller, Robert R.
Izdano: (2010)
od: Moeller, Robert R.
Izdano: (2010)
Nessus network auditing
od: Beale, Jay
Izdano: (2004)
od: Beale, Jay
Izdano: (2004)
Information getting, protecting and using data.
Izdano: (2003)
Izdano: (2003)
Security and control in information systems a guide for business and accounting /
od: Hawker, Andrew
Izdano: (2000)
od: Hawker, Andrew
Izdano: (2000)
Information management & computer security.
Izdano: (2007)
Izdano: (2007)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
od: Winterfeld, Steve
Izdano: (2013)
od: Winterfeld, Steve
Izdano: (2013)
Aspects of network and information security
Izdano: (2008)
Izdano: (2008)
Enterprise information security and privacy
Izdano: (2009)
Izdano: (2009)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
od: Andress, Jason
Izdano: (2014)
od: Andress, Jason
Izdano: (2014)
Information security a manager's guide to thwarting data thieves and hackers /
od: Alexander, Philip, 1963-
Izdano: (2008)
od: Alexander, Philip, 1963-
Izdano: (2008)
Foundations of information technology /
od: Yadav, D. S.
Izdano: (2008)
od: Yadav, D. S.
Izdano: (2008)
Information technology network and internet
od: Bhunia, C. T.
Izdano: (2008)
od: Bhunia, C. T.
Izdano: (2008)
Turning heads and changing minds : transcending IT auditor archetypes /
od: Ee, Chong
Izdano: (2013)
od: Ee, Chong
Izdano: (2013)
Web security basics
od: Bhasin, Shweta, 1977-
Izdano: (2003)
od: Bhasin, Shweta, 1977-
Izdano: (2003)
IT compliance and controls best practices for implementation /
od: DeLuccia, James J., 1977-
Izdano: (2008)
od: DeLuccia, James J., 1977-
Izdano: (2008)
Cyber adversary characterization auditing the hacker mind /
Izdano: (2004)
Izdano: (2004)
Data visualization.
Izdano: (2013)
Izdano: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
od: McIlwraith, Angus
Izdano: (2006)
od: McIlwraith, Angus
Izdano: (2006)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
od: Mehan, Julie E.
Izdano: (2009)
od: Mehan, Julie E.
Izdano: (2009)
The misuse of information systems the impact of security countermeasures /
od: D'Arcy, John P., 1975-
Izdano: (2007)
od: D'Arcy, John P., 1975-
Izdano: (2007)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
od: Betz, Charles T.
Izdano: (2007)
od: Betz, Charles T.
Izdano: (2007)
Computer and information security handbook
Izdano: (2009)
Izdano: (2009)
The basics of web hacking tools and techniques to attack the Web /
od: Pauli, Joshua J.
Izdano: (2013)
od: Pauli, Joshua J.
Izdano: (2013)
The dark sides of the Internet : on cyber threats and information warfare /
od: Heickerö, Roland
Izdano: (2013)
od: Heickerö, Roland
Izdano: (2013)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
od: Savoie, Michael J.
Izdano: (2012)
od: Savoie, Michael J.
Izdano: (2012)
Designing network security : a practical guide to creating a secure network infrastructure /
od: Kaeo, Merike
Izdano: (2004)
od: Kaeo, Merike
Izdano: (2004)
Security risk management building an information security risk management program from the ground up /
od: Wheeler, Evan
Izdano: (2011)
od: Wheeler, Evan
Izdano: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
od: Mularien, Peter
Izdano: (2010)
od: Mularien, Peter
Izdano: (2010)
Information assurance dependability and security in networked systems /
Izdano: (2008)
Izdano: (2008)
Identity management concepts, technologies, and systems /
od: Bertino, Elisa
Izdano: (2011)
od: Bertino, Elisa
Izdano: (2011)
SSL and TLS theory and practice /
od: Oppliger, Rolf
Izdano: (2009)
od: Oppliger, Rolf
Izdano: (2009)
Web commerce security design and development /
od: Nahari, Hadi
Izdano: (2011)
od: Nahari, Hadi
Izdano: (2011)
Managing information security
Izdano: (2010)
Izdano: (2010)
Dictionary of information security
od: Slade, Robert
Izdano: (2006)
od: Slade, Robert
Izdano: (2006)
Wars of disruption and resilience cybered conflict, power, and national security /
od: Demchak, Chris C.
Izdano: (2011)
od: Demchak, Chris C.
Izdano: (2011)
How to cheat at managing information security
od: Osborne, Mark
Izdano: (2006)
od: Osborne, Mark
Izdano: (2006)
Slični predmeti
-
IT audit, control, and security
od: Moeller, Robert R.
Izdano: (2010) -
Nessus network auditing
od: Beale, Jay
Izdano: (2004) -
Information getting, protecting and using data.
Izdano: (2003) -
Security and control in information systems a guide for business and accounting /
od: Hawker, Andrew
Izdano: (2000) -
Information management & computer security.
Izdano: (2007)