IT auditing : using controls to protect information assets
| Main Author: | Davis, Chris |
|---|---|
| Format: | Book |
| Published: |
New York :
Tata McGraw-Hill Pub. Comp. Ltd ,
2007
|
| Subjects: |
Similar Items
Koleksi lengkap Software Hacking & teknik penghalang
by: Nik Fauzi
by: Nik Fauzi
Network security 1 and 2 companion guide
by: Rufi, Antoon W.
Published: (2007)
by: Rufi, Antoon W.
Published: (2007)
Network security technologies and solutions
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
Network security : the complete reference
by: Bragg, Roberta
Published: (2005)
by: Bragg, Roberta
Published: (2005)
End-to-end network security : defense-in-depth
by: Santos, Omar
Published: (2008)
by: Santos, Omar
Published: (2008)
Web security & commerce
by: Garfinkel, Simson
Published: (1997)
by: Garfinkel, Simson
Published: (1997)
Hacker 5 : pakar keselamatan rangkaian - norton internet security
Published: (2005)
Published: (2005)
Cryptography & network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Build your own security lab : a field guide for network testing
by: Gregg, Micheal (Micheal C.)
Published: (2008)
by: Gregg, Micheal (Micheal C.)
Published: (2008)
Cryptography and network security
by: Bagad, V.S
by: Bagad, V.S
Auditing : questions and answers
by: Vaid, Naresh
by: Vaid, Naresh
Auditing : principles, practices and problems
by: Prakash, Jagdish
Published: (2005)
by: Prakash, Jagdish
Published: (2005)
Elements of auditing
by: Jha, Aruna
Published: (2005)
by: Jha, Aruna
Published: (2005)
Hacker 5 : Menyingkap Rahsia Windows
Published: (2005)
Published: (2005)
Auditing : principles, techniques & practices
by: Mohd. Ashraf Ali
Published: (2013)
by: Mohd. Ashraf Ali
Published: (2013)
Kesedaran keselamatan siber
Published: (2019)
Published: (2019)
Principles of auditing & other Assurance Services : 16th edition
by: Whittington, O.Ray
Published: (2008)
by: Whittington, O.Ray
Published: (2008)
Auditing and assurance
Published: (2010)
Published: (2010)
Cryptography and network security
by: Kahate, Atul
Published: (2008)
by: Kahate, Atul
Published: (2008)
Fundamentals of computer security technology
by: Amoroso, Edward G.
Published: (1994)
by: Amoroso, Edward G.
Published: (1994)
Bookkeeping and auditing : a career guide
by: Watts, Harry
Published: (2019)
by: Watts, Harry
Published: (2019)
Efficiency and performance audit
by: Agarwal, N.P
Published: (2006)
by: Agarwal, N.P
Published: (2006)
88 privacy breaches to beware of : practical data protection tips from real-life experiences
by: Shepherdenson, Kevin
Published: (2016)
by: Shepherdenson, Kevin
Published: (2016)
Auditing
by: Srinivasan Anand G.
Published: (2011)
by: Srinivasan Anand G.
Published: (2011)
Instrusion alert : an ethical hacking guide to intrusion detection
by: Fadia, Ankit
Published: (2007)
by: Fadia, Ankit
Published: (2007)
Teknik menggempur virus
by: Muhammad Haiqal Mohd Jamaluddin
Published: (2009)
by: Muhammad Haiqal Mohd Jamaluddin
Published: (2009)
How to cheat at managing information security
by: Osborne, Mark
Published: (2006)
by: Osborne, Mark
Published: (2006)
Designing an IAM Framework with oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Pengauditan satu pengenalan
by: Rosli Samat
Published: (2006)
by: Rosli Samat
Published: (2006)
8 steps to better security : a simple cyber resilience guide for business
by: Crawley, Kim
Published: (2022)
by: Crawley, Kim
Published: (2022)
Environmental reporting & auditing
by: Bhardwaj R.K
Published: (2009)
by: Bhardwaj R.K
Published: (2009)
Auditing and corporate accounting
by: Shah, C. K
Published: (2011)
by: Shah, C. K
Published: (2011)
Similar Items
-
Koleksi lengkap Software Hacking & teknik penghalang
by: Nik Fauzi -
Network security 1 and 2 companion guide
by: Rufi, Antoon W.
Published: (2007) -
Network security technologies and solutions
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008) -
Network security : the complete reference
by: Bragg, Roberta
Published: (2005) -
End-to-end network security : defense-in-depth
by: Santos, Omar
Published: (2008)