The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
I tiakina i:
Kaituhi matua: | Gantz, Stephen D. |
---|---|
Ētahi atu kaituhi: | Maske, Steve |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
Rangatū: | The basics
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
IT audit, control, and security
mā: Moeller, Robert R.
I whakaputaina: (2010)
mā: Moeller, Robert R.
I whakaputaina: (2010)
Nessus network auditing
mā: Beale, Jay
I whakaputaina: (2004)
mā: Beale, Jay
I whakaputaina: (2004)
Information getting, protecting and using data.
I whakaputaina: (2003)
I whakaputaina: (2003)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
mā: Winterfeld, Steve
I whakaputaina: (2013)
mā: Winterfeld, Steve
I whakaputaina: (2013)
Security and control in information systems a guide for business and accounting /
mā: Hawker, Andrew
I whakaputaina: (2000)
mā: Hawker, Andrew
I whakaputaina: (2000)
Information management & computer security.
I whakaputaina: (2007)
I whakaputaina: (2007)
Aspects of network and information security
I whakaputaina: (2008)
I whakaputaina: (2008)
Enterprise information security and privacy
I whakaputaina: (2009)
I whakaputaina: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
mā: Alexander, Philip, 1963-
I whakaputaina: (2008)
mā: Alexander, Philip, 1963-
I whakaputaina: (2008)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
mā: Andress, Jason
I whakaputaina: (2014)
mā: Andress, Jason
I whakaputaina: (2014)
Cyber adversary characterization auditing the hacker mind /
I whakaputaina: (2004)
I whakaputaina: (2004)
Web security basics
mā: Bhasin, Shweta, 1977-
I whakaputaina: (2003)
mā: Bhasin, Shweta, 1977-
I whakaputaina: (2003)
IT compliance and controls best practices for implementation /
mā: DeLuccia, James J., 1977-
I whakaputaina: (2008)
mā: DeLuccia, James J., 1977-
I whakaputaina: (2008)
Foundations of information technology /
mā: Yadav, D. S.
I whakaputaina: (2008)
mā: Yadav, D. S.
I whakaputaina: (2008)
Information technology network and internet
mā: Bhunia, C. T.
I whakaputaina: (2008)
mā: Bhunia, C. T.
I whakaputaina: (2008)
Data visualization.
I whakaputaina: (2013)
I whakaputaina: (2013)
Turning heads and changing minds : transcending IT auditor archetypes /
mā: Ee, Chong
I whakaputaina: (2013)
mā: Ee, Chong
I whakaputaina: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
mā: McIlwraith, Angus
I whakaputaina: (2006)
mā: McIlwraith, Angus
I whakaputaina: (2006)
The misuse of information systems the impact of security countermeasures /
mā: D'Arcy, John P., 1975-
I whakaputaina: (2007)
mā: D'Arcy, John P., 1975-
I whakaputaina: (2007)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
mā: Mehan, Julie E.
I whakaputaina: (2009)
mā: Mehan, Julie E.
I whakaputaina: (2009)
Computer and information security handbook
I whakaputaina: (2009)
I whakaputaina: (2009)
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004)
mā: Kaeo, Merike
I whakaputaina: (2004)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
mā: Betz, Charles T.
I whakaputaina: (2007)
mā: Betz, Charles T.
I whakaputaina: (2007)
Security risk management building an information security risk management program from the ground up /
mā: Wheeler, Evan
I whakaputaina: (2011)
mā: Wheeler, Evan
I whakaputaina: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
mā: Mularien, Peter
I whakaputaina: (2010)
mā: Mularien, Peter
I whakaputaina: (2010)
The dark sides of the Internet : on cyber threats and information warfare /
mā: Heickerö, Roland
I whakaputaina: (2013)
mā: Heickerö, Roland
I whakaputaina: (2013)
The basics of web hacking tools and techniques to attack the Web /
mā: Pauli, Joshua J.
I whakaputaina: (2013)
mā: Pauli, Joshua J.
I whakaputaina: (2013)
Identity management concepts, technologies, and systems /
mā: Bertino, Elisa
I whakaputaina: (2011)
mā: Bertino, Elisa
I whakaputaina: (2011)
Information assurance dependability and security in networked systems /
I whakaputaina: (2008)
I whakaputaina: (2008)
SSL and TLS theory and practice /
mā: Oppliger, Rolf
I whakaputaina: (2009)
mā: Oppliger, Rolf
I whakaputaina: (2009)
Web commerce security design and development /
mā: Nahari, Hadi
I whakaputaina: (2011)
mā: Nahari, Hadi
I whakaputaina: (2011)
Managing information security
I whakaputaina: (2010)
I whakaputaina: (2010)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
mā: Savoie, Michael J.
I whakaputaina: (2012)
mā: Savoie, Michael J.
I whakaputaina: (2012)
How to cheat at managing information security
mā: Osborne, Mark
I whakaputaina: (2006)
mā: Osborne, Mark
I whakaputaina: (2006)
Threat modeling : designing for security /
mā: Shostack, Adam
I whakaputaina: (2014)
mā: Shostack, Adam
I whakaputaina: (2014)
Network security /
mā: Perez, Andre
I whakaputaina: (2014)
mā: Perez, Andre
I whakaputaina: (2014)
Buffer overflow attacks detect, exploit, prevent /
mā: Foster, James C.
I whakaputaina: (2005)
mā: Foster, James C.
I whakaputaina: (2005)
Silence on the wire a field guide to passive reconnaissance and indirect attacks /
mā: Zalewski, Michal
I whakaputaina: (2005)
mā: Zalewski, Michal
I whakaputaina: (2005)
Network security evaluation using the NSA IEM /
mā: Fuller, Ed
I whakaputaina: (2005)
mā: Fuller, Ed
I whakaputaina: (2005)
How to cheat at Configuring ISA Server 2004
mā: Shinder, Dr. Thomas W.
I whakaputaina: (2004)
mā: Shinder, Dr. Thomas W.
I whakaputaina: (2004)
Ngā tūemi rite
-
IT audit, control, and security
mā: Moeller, Robert R.
I whakaputaina: (2010) -
Nessus network auditing
mā: Beale, Jay
I whakaputaina: (2004) -
Information getting, protecting and using data.
I whakaputaina: (2003) -
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
mā: Winterfeld, Steve
I whakaputaina: (2013) -
Security and control in information systems a guide for business and accounting /
mā: Hawker, Andrew
I whakaputaina: (2000)