The basics of IT audit : purposes, processes, and practical information /
"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organ...
Сохранить в:
Главный автор: | Gantz, Stephen D. |
---|---|
Другие авторы: | Maske, Steve |
Формат: | Электронный ресурс eКнига |
Язык: | английский |
Опубликовано: |
Amsterdam, [Netherlands] :
Syngress, an imprint of Elsevier,
[2014]
|
Серии: | The basics
|
Предметы: | |
Online-ссылка: | An electronic book accessible through the World Wide Web; click to view |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
IT audit, control, and security
по: Moeller, Robert R.
Опубликовано: (2010)
по: Moeller, Robert R.
Опубликовано: (2010)
Nessus network auditing
по: Beale, Jay
Опубликовано: (2004)
по: Beale, Jay
Опубликовано: (2004)
Information getting, protecting and using data.
Опубликовано: (2003)
Опубликовано: (2003)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
по: Winterfeld, Steve
Опубликовано: (2013)
по: Winterfeld, Steve
Опубликовано: (2013)
Information management & computer security.
Опубликовано: (2007)
Опубликовано: (2007)
Security and control in information systems a guide for business and accounting /
по: Hawker, Andrew
Опубликовано: (2000)
по: Hawker, Andrew
Опубликовано: (2000)
Aspects of network and information security
Опубликовано: (2008)
Опубликовано: (2008)
Enterprise information security and privacy
Опубликовано: (2009)
Опубликовано: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
по: Alexander, Philip, 1963-
Опубликовано: (2008)
по: Alexander, Philip, 1963-
Опубликовано: (2008)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
по: Andress, Jason
Опубликовано: (2014)
по: Andress, Jason
Опубликовано: (2014)
Cyber adversary characterization auditing the hacker mind /
Опубликовано: (2004)
Опубликовано: (2004)
Web security basics
по: Bhasin, Shweta, 1977-
Опубликовано: (2003)
по: Bhasin, Shweta, 1977-
Опубликовано: (2003)
IT compliance and controls best practices for implementation /
по: DeLuccia, James J., 1977-
Опубликовано: (2008)
по: DeLuccia, James J., 1977-
Опубликовано: (2008)
Foundations of information technology /
по: Yadav, D. S.
Опубликовано: (2008)
по: Yadav, D. S.
Опубликовано: (2008)
Information technology network and internet
по: Bhunia, C. T.
Опубликовано: (2008)
по: Bhunia, C. T.
Опубликовано: (2008)
Data visualization.
Опубликовано: (2013)
Опубликовано: (2013)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
по: McIlwraith, Angus
Опубликовано: (2006)
по: McIlwraith, Angus
Опубликовано: (2006)
The misuse of information systems the impact of security countermeasures /
по: D'Arcy, John P., 1975-
Опубликовано: (2007)
по: D'Arcy, John P., 1975-
Опубликовано: (2007)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
по: Mehan, Julie E.
Опубликовано: (2009)
по: Mehan, Julie E.
Опубликовано: (2009)
Turning heads and changing minds : transcending IT auditor archetypes /
по: Ee, Chong
Опубликовано: (2013)
по: Ee, Chong
Опубликовано: (2013)
Computer and information security handbook
Опубликовано: (2009)
Опубликовано: (2009)
Architecture and patterns for IT service management, resource planning, and governance making shoes for the cobbler's children /
по: Betz, Charles T.
Опубликовано: (2007)
по: Betz, Charles T.
Опубликовано: (2007)
The dark sides of the Internet : on cyber threats and information warfare /
по: Heickerö, Roland
Опубликовано: (2013)
по: Heickerö, Roland
Опубликовано: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
по: Kaeo, Merike
Опубликовано: (2004)
по: Kaeo, Merike
Опубликовано: (2004)
The basics of web hacking tools and techniques to attack the Web /
по: Pauli, Joshua J.
Опубликовано: (2013)
по: Pauli, Joshua J.
Опубликовано: (2013)
Security risk management building an information security risk management program from the ground up /
по: Wheeler, Evan
Опубликовано: (2011)
по: Wheeler, Evan
Опубликовано: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
по: Mularien, Peter
Опубликовано: (2010)
по: Mularien, Peter
Опубликовано: (2010)
Identity management concepts, technologies, and systems /
по: Bertino, Elisa
Опубликовано: (2011)
по: Bertino, Elisa
Опубликовано: (2011)
Information assurance dependability and security in networked systems /
Опубликовано: (2008)
Опубликовано: (2008)
SSL and TLS theory and practice /
по: Oppliger, Rolf
Опубликовано: (2009)
по: Oppliger, Rolf
Опубликовано: (2009)
Web commerce security design and development /
по: Nahari, Hadi
Опубликовано: (2011)
по: Nahari, Hadi
Опубликовано: (2011)
Building successful information systems five best practices to ensure organizational effectiveness and profitability /
по: Savoie, Michael J.
Опубликовано: (2012)
по: Savoie, Michael J.
Опубликовано: (2012)
Managing information security
Опубликовано: (2010)
Опубликовано: (2010)
How to cheat at managing information security
по: Osborne, Mark
Опубликовано: (2006)
по: Osborne, Mark
Опубликовано: (2006)
Wars of disruption and resilience cybered conflict, power, and national security /
по: Demchak, Chris C.
Опубликовано: (2011)
по: Demchak, Chris C.
Опубликовано: (2011)
Threat modeling : designing for security /
по: Shostack, Adam
Опубликовано: (2014)
по: Shostack, Adam
Опубликовано: (2014)
Network security /
по: Perez, Andre
Опубликовано: (2014)
по: Perez, Andre
Опубликовано: (2014)
Computer security fundamentals /
по: Easttom, Chuck
Опубликовано: (2006)
по: Easttom, Chuck
Опубликовано: (2006)
Invasion of privacy! big brother and the company hackers /
по: Weber, Michael
Опубликовано: (2004)
по: Weber, Michael
Опубликовано: (2004)
Silence on the wire a field guide to passive reconnaissance and indirect attacks /
по: Zalewski, Michal
Опубликовано: (2005)
по: Zalewski, Michal
Опубликовано: (2005)
Схожие документы
-
IT audit, control, and security
по: Moeller, Robert R.
Опубликовано: (2010) -
Nessus network auditing
по: Beale, Jay
Опубликовано: (2004) -
Information getting, protecting and using data.
Опубликовано: (2003) -
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
по: Winterfeld, Steve
Опубликовано: (2013) -
Information management & computer security.
Опубликовано: (2007)