Security Considerations for E-Mail (Unbekannt)
- Neue Suche nach: Martell, S.
- Neue Suche nach: Martell, S.
In:
EDP AUDITOR JOURNAL
;
4
;
24
;
1993
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Security Considerations for E-Mail
-
Beteiligte:Martell, S. ( Autor:in )
-
Erschienen in:EDP AUDITOR JOURNAL ; 4 ; 24
-
Verlag:
- Neue Suche nach: SOCIETY OF NATIONAL ASSOCIATION PUBLICATIONS
-
Erscheinungsdatum:01.01.1993
-
Format / Umfang:24 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Unbekannt
- Neue Suche nach: 657.45
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.45 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 4
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Issues & CommentsCangemi, Michael P. et al. | 1995
- 5
-
EDITORIAL: Issues & CommentsCangemi, Michael P. et al. | 1994
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses IS corporate governance as the infant segment of an emerging standard among IT control community constituencies| 1999
- 6
-
How to Keep IT Under Control in Today's Business and Technology EnvironmentGuldentops, Erik et al. | 1996
- 7
-
The use of CobiT as a framework and CobiT AdvisorClifford, Alan P. et al. | 1998
- 7
-
Making Effective Oral PresentationsGolen, S. / Scott, H. et al. | 1992
- 8
-
GUEST EDITORIAL: EDP Auditing: The Heights Still Have Not Been ReachedParker, Robert G. et al. | 1994
- 8
-
Security in the Data Warehouse-Internet EnvironmentInmon, William H. et al. | 1997
- 9
-
Use Application Program Change Control to Reduce Your RisksDykes Jr, Wyndell C. et al. | 1995
- 9
-
IS Security Matters - Who is Melissa Chernobyl and Why is She Doing These Terrible Things? - Lessons learned and questions still unanswered are presented as well as ways to avoid infestationRoss, Steven J. et al. | 1999
- 10
-
HelpSource Q& ALilly, Fred et al. | 1996
- 12
-
Control Objectives for Information and related Technology COBITMakosz, Paul et al. | 1996
- 13
-
PERSPECTIVES: Information Systems Audit EducationKneer, Dan et al. | 1994
- 13
-
Case Study - VASCO Data Security Enables Secure Communications Over the Internet - How to balance responsibility to secure data against consumer desire for easy access is the focus of this articleHoornaert, Frank et al. | 1999
- 14
-
The Law of Computer Technology: Rights - Licenses - Liabilities (2nd Edition)Fordham, Thomas et al. | 1996
- 14
-
Internet and EDI in Effective AccountingBoef, Anthonie den et al. | 1997
- 15
-
Using Oracle Tools to Audit Oracle Logical SecurityCrider, Wilson et al. | 1998
- 17
-
Utilizing CAATs to Determine Input ErrorsGillevet, Joe et al. | 1995
- 17
-
Standards, Statements and Guidelines - Compliance to maintain ISACA member status and compliance for the CISA designation are outlined and the status of ISACA issuances is noted| 1999
- 17
-
The Internet: Exploring Advertising Opportunities Using the InternetKogan, Alexander et al. | 1996
- 19
-
Flashback to the years 1980 to 1985Perry, William E. et al. | 1997
- 20
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 1999
- 20
-
LANs Are Not As Secure As You ThinkGlassman, H. N. et al. | 1993
- 23
-
Taking the Lead in the Management of Information SystemsSarup, Deepak et al. | 1997
- 23
-
CASE HISTORY: Auditing the Purchase of End-User ComputingBlackburn, Sarah et al. | 1994
- 24
-
Security Considerations for E-MailMartell, S. et al. | 1993
- 25
-
Perspective - What is so Special about Y2K Projects? - The author purports that there has been constant bandying of the Y2K phenomenon, yet makes his case that it should be handled as any other audit project. He also discusses one key difference: An inflexible implementation dateOliver, Derek J. et al. | 1999
- 26
-
Windows NT 3.5: Guidelines for Security, Audit and ControlKazin, Joel S. et al. | 1995
- 26
-
A Comparison of Internal Control: COBIT, SAC, COSO and SASColbert, Janet L. et al. | 1996
- 27
-
Separating IT Resources Using CobiT as a GuidelineTaylor, Don et al. | 1997
- 28
-
Managing Data Quality in Client-Server EnvironmentsBowen, Paul L. et al. | 1995
- 30
-
BOOKS, TAPES, AND NEW PRODUCTS| 1994
- 31
-
Techniques for Auditing Novell's NetWareCrowell, D. A. et al. | 1992
- 31
-
Book Reviews - Two books, Corporate Information Management Systems Windows 95 in a NutshellApplegate, Lynda M. et al. | 1999
- 34
-
The Evolution of the Internet in PeruJáuregui, Kety Lourdes et al. | 1998
- 34
-
Features - Middleware Security: CORBA or DCOM? - How security and control are implemented in two competing information systems architectures is the focus of this articleGarceau, Linda R. et al. | 1999
- 35
-
Protecting Excel WorksheetsMcFadden, Patrick J. et al. | 1997
- 36
-
CPE QUIZ| 1994
- 36
-
The Law of Electronic Commerce: EDI, Fax, and E-Mail| 1993
- 36
-
Targeting Potential Audit Risk Areas on Radar GraphsHunton, James E. et al. | 1995
- 36
-
Controlling EDI Environments Consistent with COBIT and COSOJoseph, Gilbert W. et al. | 1996
- 38
-
FEATURE ARTICLES: The Evolution of EDP Auditing in North America: 1977 to 1994Singleton, Tommie et al. | 1994
- 42
-
Windows NT Security and AuditingGauntt, Ann et al. | 1995
- 44
-
Features - Is Auditing: The State of the Profession Going Into the 21st Century - The author provides insights based on a survey and offers additional perspectiveLucy, Richard F. et al. | 1999
- 44
-
Microcomputer Security - Is Your Organization at Risk?West, O. D. / Zoladz, C. et al. | 1993
- 47
-
A Top-Down Approach to Auditing the Management of the Information Systems FunctionCapuder, L. F. / Thomas, T. C. et al. | 1992
- 48
-
Security in Client-Server: Authentication IssuesCairo, Lori et al. | 1995
- 50
-
CPE Quiz #49| 1996
- 50
-
Viruses and UNIX - What Computer Viruses Are - And Are NotConorich, D. G. et al. | 1993
- 51
-
Developments in EDP Audit Education, Research and Literature in North America: 1977 to 1994Singleton, Tommie et al. | 1994
- 52
-
Features - The Year 2000 and the Small Business El Año 2000 y Los Pequeños Negocios - This article, presented in both English and Spanish, is a Journal debut and reflects a commitment to run articles in languages other than EnglishRodriguez, German et al. | 1999
- 55
-
The Israeli "Internal Auditing Act, 1992"Sebban, Y. E. et al. | 1992
- 56
-
An Analysis of Software Management Controls for Client-Server ArchitecturesButler, C. W. / Richardson, G. L. et al. | 1993
- 58
-
Features - How to Keep a Private Branch Exchange Safe PBX switches are a favorite target of unscrupulous people. This article presents what can be done to prevent PBX fraud or disruptionHarvel, Murray et al. | 1999
- 58
-
Bookstore Listing| 1997
- 62
-
Looking Ahead: The Future of the IS Audit and Control ProfessionOWen, Laura et al. | 1994
- 62
-
Career Opportunities| 1997
- 63
-
Plus - CPE Quiz #65Oringel, Joey et al. | 1999
- 65
-
Features - New Assurance Service Opportunities for Information Systems Auditors - COBIT 2nd Edition is cited as an important tool for the design and delivery of risk assessment assurance and other critical assurance servicesHunton, James et al. | 1999
- 69
-
ISACA Bookstore Offerings| 1999
- 69
-
How Do Expert and Novice Information Systems Auditors Differ in Domain Knowledge?Wu, R. C. et al. | 1992
- 69
-
Index of Journal Articles in 1994| 1994
- 72
-
The Possible Impact of the COSO Report on an Entity's Internal Audit FunctionRezaee, Z. et al. | 1993
- 73
-
ISACA Bookstore Price List| 1999
-
Focus on 1999 - Millennium Watch, edited for the International Federation of Accountants by Past International President, Deepak Sarup, will return in a subsequent issue| 1999