- Documentojopdf0801-auditing-ibm.pdfcargado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcargado porJerome B. Agliam
- DocumentoRefining IT Processes Using COBITcargado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcargado porJerome B. Agliam
- DocumentoRefining IT Processes Using COBITcargado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcargado porJerome B. Agliam
- DocumentoRefining IT Processes Using COBITcargado porJerome B. Agliam
- DocumentoCentralized Security Managementcargado porJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Center.pdfcargado porJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Centercargado porJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Center.pdfcargado porJerome B. Agliam
- DocumentoChanges to Information Processescargado porJerome B. Agliam
- DocumentoPrinciples of Governancecargado porJerome B. Agliam
- DocumentoThe IS Auditor's Consideration of Irregularitiescargado porJerome B. Agliam
- DocumentoImplementing Enterprise Securitycargado porJerome B. Agliam
- DocumentoIT Governance - Why a Guidelinecargado porJerome B. Agliam
- DocumentoRisk Assessment Tools - A Primercargado porJerome B. Agliam
- DocumentoImplementing Enterprise Securitycargado porJerome B. Agliam
- DocumentoThe Computer Forensics and Cybersecurity Governance Modelcargado porJerome B. Agliam
- DocumentoSpotlight on Governance.pdfcargado porJerome B. Agliam
- DocumentoSpotlight on Governancecargado porJerome B. Agliam
- DocumentoUsing CAATs to Support IS Auditcargado porJerome B. Agliam
- DocumentoSpotlight on Governance.pdfcargado porJerome B. Agliam
- DocumentoSecurity Architecturecargado porJerome B. Agliam
- DocumentoImpact of SAS No. 94 on Computer Audit Techniquescargado porJerome B. Agliam
- DocumentoBlack Box Logging and Tertiary Monitoring of Continuous Assurance Systemscargado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcargado porJerome B. Agliam
- DocumentoISACA Standardscargado porJerome B. Agliam
- DocumentoSimplify and Layer Your Security Approach to Protect Card Datacargado porJerome B. Agliam
- DocumentoInformation Security From a Business Perspective - A Lottery Sector Case Studycargado porJerome B. Agliam
- DocumentoRecords Retentioncargado porJerome B. Agliam
- DocumentoHacking Exposedcargado porJerome B. Agliam
- DocumentoSensitive Datacargado porJerome B. Agliam
- DocumentoA Young Professional’s Guide to Career Success Using Soft Skillscargado porJerome B. Agliam
- DocumentoDo governments have the right to compel corporations to divulge information if governments see national (or local) safety at stake?cargado porJerome B. Agliam
- DocumentoAuditing Biometrics-based Authentication Systemscargado porJerome B. Agliam
- DocumentoThe Relevance of IT in Criminal Investigationscargado porJerome B. Agliam
- DocumentoRisk Management When Implementing ERP Systemscargado porJerome B. Agliam
- DocumentoFederation of E-governmentcargado porJerome B. Agliam
- DocumentoSecurity and Privacy vs. Computer Forensics Capabilitiescargado porJerome B. Agliam
- DocumentoWho Audits Auditorscargado porJerome B. Agliam
- DocumentoJopdf0705 Turning a Securitycargado porJerome B. Agliam
- DocumentoOne of Today’s Most Overlooked Security Threats—Six Ways Auditors Can Fight Itcargado porJerome B. Agliam
- DocumentoPrivacy PKIcargado porJerome B. Agliam
- DocumentoExecutive and Board Roles in Information Securitycargado porJerome B. Agliam
- DocumentoIS Auditing Standards in Malaysiacargado porJerome B. Agliam
- DocumentoData Warehouse Audits Promote and Sustain Reporting System Valuecargado porJerome B. Agliam
- DocumentoSAS70 Reportscargado porJerome B. Agliam
- DocumentoeBusiness Trust Inhibitorscargado porJerome B. Agliam