Seite 3 von 899 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

  1.  

    End Point Security

    Leo, Martin | Online Contents | 2008
  2.  

    Book Review: Stepping Through the InfoSec Program

    Axelrod, C.Warren | Online Contents | 2008
  3.  

    Five Questions With...

    Karygiannis, Tom | Online Contents | 2008
  4.  

    Case Study: Continuous Auditing Comes of Age

    Brennan, Gerard | Online Contents | 2008
  5.  

    Insider Threat -- The Fraud That Puts Companies at Risk

    Taylor, Patrick | Online Contents | 2008
  6.  

    HelpSource Q&A

    Subramaniam, Gan | Online Contents | 2008
  7.  

    IT Governance: IT Governance Global Status Report 2008: An Excerpt

    Steuperaert, Dirk | Online Contents | 2008
  8.  

    Guest Editorial: Mobility Changes (Almost) Everything!

    Boni, William C. | Online Contents | 2008
  9.  

    The New World of Risk-based Regulation (Part 2)

    Micallef, Mario | Online Contents | 2008
  10.  

    Measuring the Readability of Software Requirement Specifications: An Empirical Study

    Kanter, Howard A. / Muscarello, Thomas J. / Ralston, Christopher | Online Contents | 2008
  11.  

    Business Risks and Security Assessment for Mobile Devices

    Milligan, Patricia Mayer / Hutcheson, Donna | Online Contents | 2008
  12.  

    Five Questions With...

    Hinson, Gary | Online Contents | 2007
  13.  

    The New World of Risk-based Regulation (Part 1)

    Micallef, Mario | Online Contents | 2007
  14.  

    Help Source Q&A

    Subramaniam, Gan | Online Contents | 2007
  15.  

    IT Audit Basics: IT Audit Education and Professional Development

    Singleton, Tommie | Online Contents | 2007
  16.  

    IT Security Matters: Mail Call III

    Ross, Steven J. | Online Contents | 2007

Ergebnisse anzeigen: 10 | 20 | 50