Five Questions With (Englisch)
- Neue Suche nach: Hayes, T.
- Neue Suche nach: Hayes, T.
In:
ISACA JOURNAL
;
4
;
10-11
;
2013
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Five Questions With
-
Beteiligte:Hayes, T. ( Autor:in )
-
Erschienen in:ISACA JOURNAL ; 4 ; 10-11
-
Verlag:
- Neue Suche nach: Information Systems Audit and Control Association
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:2 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.450285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.450285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 4
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: I Left My Security in the OfficeRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: André Maginot's LineRoss, Steven J. et al. | 2017
- 4
-
Information Security Matters: Just PrivacyRoss, S.J. et al. | 2013
- 4
-
Guest Editorial: From Continuous Auditing to Continuous Monitoring-You Should Be the ChampionCangemi, M.P. et al. | 2012
- 4
-
Information Security Matters: Boston, Berlin, Baghdad and Bora BoraRoss, S.J. et al. | 2010
- 6
-
IS Audit Basics: Audit ProgramsCooke, Ian et al. | 2017
- 6
-
IS Audit Basics: What Every IT Auditor Should Know About Using Inquiry to Gather EvidenceSingleton, T. et al. | 2013
- 6
-
The NetworkClyde, Rob et al. | 2018
- 7
-
IT Audit Basics: Top Five Fraud Axioms IT Auditors Should KnowSingleton, T.W. et al. | 2010
- 8
-
IS Audit Basics: Add Value to What Is ValuedCooke, Ian et al. | 2018
- 8
-
Information Security Matters: Keynes, Shelley, Taleb and WattsRoss, S.J. et al. | 2012
- 10
-
Five Questions WithHayes, T. et al. | 2013
- 10
-
Cloud Computing: Securing Hybrid Cloud ApplicationsSweet, C. et al. | 2012
- 12
-
Health Care Reform Legislation Survival Guide, Part 1Buse, C.P. / Marks, L. / Sizemore, S. et al. | 2010
- 12
-
Risk and Compliance-For Better or Worse?George, T. et al. | 2013
- 12
-
Mobile Payments as a Security Control?Clyde, Robert et al. | 2016
- 13
-
The Power of IT Investment Risk Quantification and VisualizationPearce, Guy et al. | 2018
- 13
-
IT Audit Basics: Auditing Applications, Part 2Singleton, T.W. et al. | 2012
- 13
-
Social Media Rewards and RiskKhan, Mohammed J. et al. | 2017
- 14
-
Ethical Hacking: The Next Level or the Game Is Not Over?Polic, V. et al. | 2014
- 14
-
Mobile App Security Audit FrameworkKhan, Mohammed J. et al. | 2016
- 16
-
Man in the Browser-A Threat to Online BankingSule, D. et al. | 2013
- 17
-
Leveraging Metrics for Business InnovationDelmar, Y. et al. | 2014
- 17
-
Book Review: Enterprise Information Security and PrivacyEmani, S.B.S.P. et al. | 2010
- 18
-
Book Review: Computer and Information Security HandbookKarin, H. et al. | 2010
- 18
-
Mobile Workforce Security Considerations and PrivacyNgambeket, Guy et al. | 2017
- 18
-
From Static Networks to Software-defined NetworkingDubey, Nikesh et al. | 2016
- 19
-
Navigating the Path From Information Security Practitioner to ProfessionalAnderson, K. et al. | 2013
- 19
-
Book Review: The IBM Data Governance Unified Process: Driving Business Value With IBM Software and Best PracticesMunongwa, B. et al. | 2012
- 19
-
Applying Data Analytics to IS AuditHoesing, M. et al. | 2010
- 19
-
Integrating KRIs and KPIs for Effective Technology Risk ManagementTammineedi, Rama Lingeswara Satyanarayana et al. | 2018
- 20
-
Everybody Loves DocumentationBellehumeur, A. et al. | 2012
- 21
-
Book Review: Security Information and Event Management ImplementationCano M., J.J. et al. | 2011
- 22
-
Book Review: Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, 3^r^d EditionSpinelli, C. et al. | 2011
- 22
-
Align Business Initiatives and IT SolutionsMiyagi, I. / Monden, H. / Azuma, M. / Kimura, R. / Aramaki, M. / Hara, K. / Ishijima, T. et al. | 2014
- 23
-
The Importance of the ARAGoldberg, D.M. et al. | 2012
- 23
-
Synthesizing SAS 70 Audits and PMI's Project Management Process GroupsBell, T.J. et al. | 2010
- 23
-
Information Security Management for GovernmentsKumar, K.R. et al. | 2011
- 24
-
Protection From GDPR Penalties With an MFT StrategyBrunswick, Dave et al. | 2018
- 24
-
Key Elements of an Information Risk ProfilePironti, J.P. et al. | 2013
- 24
-
Exploring How Corporate Governance Codes Address IT GovernanceDe Haes, Steven / Joshi, Anant / Huygh, Tim / Jansen, Salvi et al. | 2017
- 25
-
Benefits and the Security Risk of Software-defined NetworkingWang, Tony et al. | 2016
- 26
-
Seven Myths of Information GovernanceRaval, V. / Dyche, G. et al. | 2012
- 28
-
Planning for and Implementing ISO 27001Pelnekar, C. et al. | 2011
- 28
-
Inquiring Into Security Requirements of Remote Code Execution for IoT DevicesFoomany, Farbod Hosseyndoust / Foroughi, Ehsan / Sethi, Rohit et al. | 2016
- 28
-
The Promises and Jeopardies of Blockchain TechnologyZongo, Phil et al. | 2018
- 29
-
The Business Case as an Operational Management Instrument-A Process ViewMaes, K. / De Haes, S. / Van Grembergen, W. et al. | 2014
- 29
-
What Is Your Risk Appetite?Pareek, M. et al. | 2013
- 31
-
Achieving Data Warehouse NirvanaReed, C. / Wang, Y. / Dutta, A. et al. | 2010
- 31
-
A Guide to Auditing Attachment Fields in Access DatabasesFilzen, Joshua J. / Simkin, Mark G. et al. | 2017
- 32
-
How to Maximize Evidential Weight of Electronically Stored InformationHamidovic, H. et al. | 2012
- 33
-
Quantifying Information Risk and SecurityGelbstein, E. et al. | 2013
- 35
-
Data Science as a Tool for Cloud SecuritySood, Aditya K. / Rinehart, Michael et al. | 2016
- 36
-
Rethinking Physical Security in the Information AgeEnglish, P. et al. | 2011
- 36
-
Adopting an Integrated Framework in Managing Fraud RisksEe, C. et al. | 2010
- 37
-
SAP Password Vulnerabilities and Access to Sensitive Business DataEspin, J. et al. | 2012
- 37
-
Fire Protection of Computer Rooms-Legal Obligations and Best PracticesHamidovic, H. et al. | 2014
- 38
-
Roles of Three Lines of Defense for Information Security and GovernanceHo, Amelia et al. | 2018
- 38
-
Measure and Monitor Application SecuritySubramanian, S. et al. | 2011
- 39
-
Readability as Lever for Employees' Compliance With Information Security PoliciesAmmann, F.-E. / Sowa, A. et al. | 2013
- 39
-
Key Ingredients to Information Privacy PlanningWlosinski, Larry G. et al. | 2017
- 40
-
Network Access Control—Has It Evolved Enough for Enterprises?Dildy, Trevor J. et al. | 2016
- 40
-
Enhancing IT Governance With a Simplified Approach to Segregation of DutiesKobelsky, K. et al. | 2014
- 41
-
Risk Perception and Trust in CloudFarahmand, F. et al. | 2010
- 41
-
The Assimilation of Marketing's Service Quality Principles and the IT Auditing ProcessBell, T.J. / Smith, T. et al. | 2011
- 43
-
DDoS Attacks-A Cyberthreat and Possible SolutionsKumar, A. et al. | 2013
- 43
-
Getting the Basics of Cybersecurity RightSerres, Ramón et al. | 2018
- 44
-
Law and Best Practices for a Sarbanes-Oxley Systems ReviewMackaden, F.G. et al. | 2014
- 44
-
Applications of Business Process Analytics and Mining for Internal ControlCaron, F. / Vanthienen, J. et al. | 2012
- 45
-
Mobile Computing Device Threats, Vulnerabilities and Risk Factors Are UbiquitousWlosinski, Larry G. et al. | 2016
- 46
-
Challenges and Lessons Learned Implementing ITIL, Part 1Nicho, Mathew / Khan, Shafaq / Mohan, Ram et al. | 2017
- 47
-
Leveraging and Securing the Bring Your Own Device and Technology ApproachPriyadarshi, G. et al. | 2013
- 48
-
Data Governance From the Actuary and Risk Management PerspectivesÖnal, Mehmet Zeki et al. | 2018
- 50
-
Conducting IS Due Diligence in a Structured Model Within a Short Period of TimeDelak, B. / Bajec, M. et al. | 2014
- 50
-
Managing Cloud RiskZongo, Phil et al. | 2016
- 51
-
Help Source Q&ASubramaniam, G. et al. | 2010
- 52
-
Tools: Using Audit Tools to Support Strategic ObjectivesLyons, Robin et al. | 2018