The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
Na minha lista:
Autor principal: | Gantz, Stephen D. |
---|---|
Outros Autores: | Maske, Steve |
Formato: | Recurso Eletrônico livro eletrônico |
Idioma: | inglês |
Publicado em: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
coleção: | The basics
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registros relacionados
IT audit, control, and security
por: Moeller, Robert R.
Publicado em: (2010)
por: Moeller, Robert R.
Publicado em: (2010)
Nessus network auditing
por: Beale, Jay
Publicado em: (2004)
por: Beale, Jay
Publicado em: (2004)
Information getting, protecting and using data.
Publicado em: (2003)
Publicado em: (2003)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado em: (2013)
por: Winterfeld, Steve
Publicado em: (2013)
Information management & computer security.
Publicado em: (2007)
Publicado em: (2007)
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado em: (2000)
por: Hawker, Andrew
Publicado em: (2000)
Aspects of network and information security
Publicado em: (2008)
Publicado em: (2008)
Enterprise information security and privacy
Publicado em: (2009)
Publicado em: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
por: Alexander, Philip, 1963-
Publicado em: (2008)
por: Alexander, Philip, 1963-
Publicado em: (2008)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
por: Andress, Jason
Publicado em: (2014)
por: Andress, Jason
Publicado em: (2014)
Cyber adversary characterization auditing the hacker mind /
Publicado em: (2004)
Publicado em: (2004)
Web security basics
por: Bhasin, Shweta, 1977-
Publicado em: (2003)
por: Bhasin, Shweta, 1977-
Publicado em: (2003)
IT compliance and controls best practices for implementation /
por: DeLuccia, James J., 1977-
Publicado em: (2008)
por: DeLuccia, James J., 1977-
Publicado em: (2008)
Foundations of information technology /
por: Yadav, D. S.
Publicado em: (2008)
por: Yadav, D. S.
Publicado em: (2008)
Information technology network and internet
por: Bhunia, C. T.
Publicado em: (2008)
por: Bhunia, C. T.
Publicado em: (2008)
Data visualization.
Publicado em: (2013)
Publicado em: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
por: McIlwraith, Angus
Publicado em: (2006)
por: McIlwraith, Angus
Publicado em: (2006)
The misuse of information systems the impact of security countermeasures /
por: D'Arcy, John P., 1975-
Publicado em: (2007)
por: D'Arcy, John P., 1975-
Publicado em: (2007)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
por: Mehan, Julie E.
Publicado em: (2009)
por: Mehan, Julie E.
Publicado em: (2009)
Turning heads and changing minds : transcending IT auditor archetypes /
por: Ee, Chong
Publicado em: (2013)
por: Ee, Chong
Publicado em: (2013)
Computer and information security handbook
Publicado em: (2009)
Publicado em: (2009)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
por: Betz, Charles T.
Publicado em: (2007)
por: Betz, Charles T.
Publicado em: (2007)
The dark sides of the Internet : on cyber threats and information warfare /
por: Heickerö, Roland
Publicado em: (2013)
por: Heickerö, Roland
Publicado em: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
por: Kaeo, Merike
Publicado em: (2004)
por: Kaeo, Merike
Publicado em: (2004)
The basics of web hacking tools and techniques to attack the Web /
por: Pauli, Joshua J.
Publicado em: (2013)
por: Pauli, Joshua J.
Publicado em: (2013)
Security risk management building an information security risk management program from the ground up /
por: Wheeler, Evan
Publicado em: (2011)
por: Wheeler, Evan
Publicado em: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
por: Mularien, Peter
Publicado em: (2010)
por: Mularien, Peter
Publicado em: (2010)
Identity management concepts, technologies, and systems /
por: Bertino, Elisa
Publicado em: (2011)
por: Bertino, Elisa
Publicado em: (2011)
Information assurance dependability and security in networked systems /
Publicado em: (2008)
Publicado em: (2008)
SSL and TLS theory and practice /
por: Oppliger, Rolf
Publicado em: (2009)
por: Oppliger, Rolf
Publicado em: (2009)
Web commerce security design and development /
por: Nahari, Hadi
Publicado em: (2011)
por: Nahari, Hadi
Publicado em: (2011)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
por: Savoie, Michael J.
Publicado em: (2012)
por: Savoie, Michael J.
Publicado em: (2012)
Managing information security
Publicado em: (2010)
Publicado em: (2010)
How to cheat at managing information security
por: Osborne, Mark
Publicado em: (2006)
por: Osborne, Mark
Publicado em: (2006)
Wars of disruption and resilience cybered conflict, power, and national security /
por: Demchak, Chris C.
Publicado em: (2011)
por: Demchak, Chris C.
Publicado em: (2011)
Threat modeling : designing for security /
por: Shostack, Adam
Publicado em: (2014)
por: Shostack, Adam
Publicado em: (2014)
Network security /
por: Perez, Andre
Publicado em: (2014)
por: Perez, Andre
Publicado em: (2014)
Computer security fundamentals /
por: Easttom, Chuck
Publicado em: (2006)
por: Easttom, Chuck
Publicado em: (2006)
Invasion of privacy! big brother and the company hackers /
por: Weber, Michael
Publicado em: (2004)
por: Weber, Michael
Publicado em: (2004)
Silence on the wire a field guide to passive reconnaissance and indirect attacks /
por: Zalewski, Michal
Publicado em: (2005)
por: Zalewski, Michal
Publicado em: (2005)
Registros relacionados
-
IT audit, control, and security
por: Moeller, Robert R.
Publicado em: (2010) -
Nessus network auditing
por: Beale, Jay
Publicado em: (2004) -
Information getting, protecting and using data.
Publicado em: (2003) -
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado em: (2013) -
Information management & computer security.
Publicado em: (2007)