The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
Zapisane w:
1. autor: | Gantz, Stephen D. |
---|---|
Kolejni autorzy: | Maske, Steve |
Format: | Elektroniczne E-book |
Język: | angielski |
Wydane: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
Seria: | The basics
|
Hasła przedmiotowe: | |
Dostęp online: | An electronic book accessible through the World Wide Web; click to view |
Etykiety: |
Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
|
Podobne zapisy
IT audit, control, and security
od: Moeller, Robert R.
Wydane: (2010)
od: Moeller, Robert R.
Wydane: (2010)
Nessus network auditing
od: Beale, Jay
Wydane: (2004)
od: Beale, Jay
Wydane: (2004)
Information getting, protecting and using data.
Wydane: (2003)
Wydane: (2003)
Security and control in information systems a guide for business and accounting /
od: Hawker, Andrew
Wydane: (2000)
od: Hawker, Andrew
Wydane: (2000)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
od: Winterfeld, Steve
Wydane: (2013)
od: Winterfeld, Steve
Wydane: (2013)
Information management & computer security.
Wydane: (2007)
Wydane: (2007)
Aspects of network and information security
Wydane: (2008)
Wydane: (2008)
Enterprise information security and privacy
Wydane: (2009)
Wydane: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
od: Alexander, Philip, 1963-
Wydane: (2008)
od: Alexander, Philip, 1963-
Wydane: (2008)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
od: Andress, Jason
Wydane: (2014)
od: Andress, Jason
Wydane: (2014)
Cyber adversary characterization auditing the hacker mind /
Wydane: (2004)
Wydane: (2004)
Web security basics
od: Bhasin, Shweta, 1977-
Wydane: (2003)
od: Bhasin, Shweta, 1977-
Wydane: (2003)
IT compliance and controls best practices for implementation /
od: DeLuccia, James J., 1977-
Wydane: (2008)
od: DeLuccia, James J., 1977-
Wydane: (2008)
Foundations of information technology /
od: Yadav, D. S.
Wydane: (2008)
od: Yadav, D. S.
Wydane: (2008)
Information technology network and internet
od: Bhunia, C. T.
Wydane: (2008)
od: Bhunia, C. T.
Wydane: (2008)
Turning heads and changing minds : transcending IT auditor archetypes /
od: Ee, Chong
Wydane: (2013)
od: Ee, Chong
Wydane: (2013)
Data visualization.
Wydane: (2013)
Wydane: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
od: McIlwraith, Angus
Wydane: (2006)
od: McIlwraith, Angus
Wydane: (2006)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
od: Mehan, Julie E.
Wydane: (2009)
od: Mehan, Julie E.
Wydane: (2009)
The misuse of information systems the impact of security countermeasures /
od: D'Arcy, John P., 1975-
Wydane: (2007)
od: D'Arcy, John P., 1975-
Wydane: (2007)
Computer and information security handbook
Wydane: (2009)
Wydane: (2009)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
od: Betz, Charles T.
Wydane: (2007)
od: Betz, Charles T.
Wydane: (2007)
The dark sides of the Internet : on cyber threats and information warfare /
od: Heickerö, Roland
Wydane: (2013)
od: Heickerö, Roland
Wydane: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
od: Kaeo, Merike
Wydane: (2004)
od: Kaeo, Merike
Wydane: (2004)
The basics of web hacking tools and techniques to attack the Web /
od: Pauli, Joshua J.
Wydane: (2013)
od: Pauli, Joshua J.
Wydane: (2013)
Security risk management building an information security risk management program from the ground up /
od: Wheeler, Evan
Wydane: (2011)
od: Wheeler, Evan
Wydane: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
od: Mularien, Peter
Wydane: (2010)
od: Mularien, Peter
Wydane: (2010)
Identity management concepts, technologies, and systems /
od: Bertino, Elisa
Wydane: (2011)
od: Bertino, Elisa
Wydane: (2011)
Information assurance dependability and security in networked systems /
Wydane: (2008)
Wydane: (2008)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
od: Savoie, Michael J.
Wydane: (2012)
od: Savoie, Michael J.
Wydane: (2012)
SSL and TLS theory and practice /
od: Oppliger, Rolf
Wydane: (2009)
od: Oppliger, Rolf
Wydane: (2009)
Web commerce security design and development /
od: Nahari, Hadi
Wydane: (2011)
od: Nahari, Hadi
Wydane: (2011)
Managing information security
Wydane: (2010)
Wydane: (2010)
Wars of disruption and resilience cybered conflict, power, and national security /
od: Demchak, Chris C.
Wydane: (2011)
od: Demchak, Chris C.
Wydane: (2011)
How to cheat at managing information security
od: Osborne, Mark
Wydane: (2006)
od: Osborne, Mark
Wydane: (2006)
Network security /
od: Perez, Andre
Wydane: (2014)
od: Perez, Andre
Wydane: (2014)
Threat modeling : designing for security /
od: Shostack, Adam
Wydane: (2014)
od: Shostack, Adam
Wydane: (2014)
Silence on the wire a field guide to passive reconnaissance and indirect attacks /
od: Zalewski, Michal
Wydane: (2005)
od: Zalewski, Michal
Wydane: (2005)
Computer security fundamentals /
od: Easttom, Chuck
Wydane: (2006)
od: Easttom, Chuck
Wydane: (2006)
Invasion of privacy! big brother and the company hackers /
od: Weber, Michael
Wydane: (2004)
od: Weber, Michael
Wydane: (2004)
Podobne zapisy
-
IT audit, control, and security
od: Moeller, Robert R.
Wydane: (2010) -
Nessus network auditing
od: Beale, Jay
Wydane: (2004) -
Information getting, protecting and using data.
Wydane: (2003) -
Security and control in information systems a guide for business and accounting /
od: Hawker, Andrew
Wydane: (2000) -
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
od: Winterfeld, Steve
Wydane: (2013)