Book Review: Oracle Security Privacy Auditing (Ohne Sprachangabe)
- Neue Suche nach: Nanda, Arup
- Neue Suche nach: Burleson, Don
ISACA, Serving IT Governance Professionals
, Rolling Meadows, Ill.; 2005
- Neue Suche nach: ISACA, Serving IT Governance Professionals
Dokumentinformationen
-
Titel:Book Review: Oracle Security Privacy Auditing
-
Autor / Urheber:
-
Zeitschrift / Reihe:
-
Band:1
-
Seite:20
-
Verlag:ISACA, Serving IT Governance Professionals
-
Erscheinungsort:Rolling Meadows, Ill.
-
Erscheinungsjahr:2005
-
ISSN:
-
ZDBID:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Ohne Sprachangabe
-
Klassifikation:
DDC: 004; 330; 020 BKL: 54.64 Datenbanken
Inhaltsverzeichnis – Band 1
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Nachweisen der enthaltenen Aufsätze. Die Anzeige der Jahrgänge kann aufgrund fehlender Aufsatznachweise unvollständig oder lückenhaft sein, obwohl die Zeitschrift komplett in der TIB verfügbar ist.
- 4
-
IS Security Matters: Cloudy DazeRoss, S.J. | 2010
- 5
-
Dysfunctional IT-A Business IssueNicholson, H. | 2008
- 5
-
Editorial - Issues & CommentsCangemi, Michael | 2004
- 5
-
Editodal - Issues & CommentsCangemi, Michael | 2005
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA addresses one of the greatest threats to a business or company: Misuse of e-mail. Among other topics, he also addresses corporate governance and accounting for earnings in the United StatesCangemi, Michael P. | 2000
- 5
-
The Reality We Can All Agree OnBostick, J. | 2009
- 5
-
Guest Editorial: Dysfunctional IT -- A Business IssueNicholson, Howard | 2008
- 5
-
Issues&CommentsCangemi, M. | 2003
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael P. Cangemi, CISA, CPA, discusses the role of the board in information security, IT governance and the foundation's 25th anniversary, then proudly declares himself an IT optimist.Cangemi, Michael P. | 2001
- 5
-
The new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United StatesCangemi, M. | 2002
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses the new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United States.Cangemi, Michael | 2002
- 6
-
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part I)Singleton, T.W. | 2010
- 7
-
IS Security Matters: Dumb Luck, Smart RiskRoss, Steven | 2008
- 8
-
IS Security Matters: Contents and ContextRoss, Steven J. | 2006
- 8
-
IS Security Matters: Professor Watts Explains It AllRoss, Steven J. | 2007
- 8
-
IS Security Matters: Is Information Security a Threat to Resilience?Ross, Steven J. | 2005
- 9
-
IT Audit Basics: The COSO Model: How IT Audtiors Can Use IT to Measure the Effectiveness on Internal Controls (Part 2)Singleton, Tommie W. | 2008
- 9
-
COBIT® Management GuidelinesElysee, M. | 2001
- 9
-
Lessons from Tragedy, RevisitedRoss, S. | 2003
- 9
-
Intrusion Signatures and AnalysisJelleyman, A. | 2002
- 9
-
"Fishy Stories" Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes| 2000
- 9
-
IS Security Matters - "Fishy Stories" - Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes, such as violation of software licenses in relation to an auditor's need to use statistics to budget for securityRoss, Steve | 2000
- 9
-
Maybe We Have WonRoss, S. J. | 2004
- 9
-
IS Security Matters: Four Little WordsRoss, S.J. | 2009
- 9
-
IS Security Matters - Maybe We Have WonRoss, Steven J. | 2004
- 9
-
IS Security Matters - Lessons from Tragedy, RevisitedRoss, Steven | 2003
- 20
-
Five Questions With...Roach, Andy | 2008
- 11
-
Lessons from TragedyRoss, S. J. | 2002
- 11
-
Standards, Statements, Guidelines - ISACA(R) Member and CISA(R) Compliance| 2003
- 11
-
IT Audit Basics: COBIT -- A Key to Success as an IT AuditorSingleton, Tommie W. | 2006
- 11
-
IT Audit Basics: Auditing Business ContinuitySayana, S.Anantha | 2005
- 11
-
Is Security Matters - Lessons from Tragedy - Steven J. Ross, CISA, provides his perspective of the recent terrorist attacks and examines the valuable lessons that businesses can learn from the events as they, the US and the world recover and prepare for the future.Ross, Steven J. | 2002
- 11
-
The Definitive Handbook of Business Continuity Management, by Andrew Hiles and Peter BarnesSarathy, E. | 2001
- 11
-
IT Audit Basics - Strategy Issues: Sarbanes-Oxley Is Only Part of the SolutionGallegos, Frederick | 2004
- 11
-
IT Value: Value Management PrinciplesGuldentops, Erik | 2007
- 11
-
ISACA® Member and CISA® Compliance| 2003
- 11
-
Strategy Issues: Sarbanes-Oxley Is Only Part of the SolutionGallegos, F. | 2004
- 12
-
The Definitive Handbook of Business Continuity Management, 2^n^d EditionRafeq, A. | 2010
- 13
-
IT Governance: Dysfunctional Operations in ITAnderson, Kent | 2008
- 13
-
e-Commerce Security-Network Perimeter Security By Deloitte & ToucheMansour, C. | 2003
- 13
-
Standards and guidelines for maintaining compliance for both ISACA™ membership and the CISA designation are outlined and the status of ISACA issuances noted| 2002
- 13
-
IT Audit Basics: What Every IT Auditor Should Know About SamplingSingleton, T.W. | 2009
- 13
-
IS Security Matters - Why Passwords Persist - Steven J Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures.Ross, Steven J. | 2001
- 13
-
Why Passwords Persist Steven J. Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures| 2001
- 13
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISAx designation are outlined and the status of ISACA issuances noted.| 2002
- 13
-
Emerging Topics and Technologies in Information SystemsKanhere, V. | 2010
- 13
-
Activity-Based Information SystemsNair, M. | 2000
- 13
-
Book Reviews - e-Commerce Security -- Network Perimeter SecurityDeloitte / Touche / Mansour, Charles | 2003
- 14
-
IT Governance: Security Folklore, Facts and the FutureSouthgate, Roger | 2005
- 14
-
The Business Value of ITde la Fuente, R.J. | 2010
- 14
-
ISACA® Member and Certification Holder Compliance| 2004
- 14
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2006
- 14
-
The Many Faces of IT Governance: Crafting an IT Governance ArchitectureRobinson, Nick | 2007
- 15
-
Spotlight on GovernanceHamaker, S. | 2003
- 15
-
IT Governance - Spotlight on GovernanceHamaker, Stacey | 2003
- 15
-
More Than a Specialized Concern:Survey of Public Sector Board Members Has Implications for IT GovernanceCapozzi, M. / Singleton, J. | 2002
- 15
-
Stepping Through the IS AuditBayuk, J. | 2000
- 15
-
IT Governance - More Than a Specialized Concern:Survey of public Sector Board Members Has Implications for IT Governance - Maria Capozzi, MPA, BA, and Jon Singleton, CISA, CA, explore a recent study that examines the board governance practices of various public sector boards within the government reporting entity, completed by Canada's Provincial Auditor's Office, and how the results can be considered in the context of IT governance.Capozzi, Maria / Singleton, Jon | 2002
- 15
-
Did We Hear the Warning Shot?Suan, B.H. | 2010
- 16
-
Case Study: IT Security Governance -- A Slow Start to a High maturity LevelBitterli, Peter R. | 2005
- 17
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances noted.| 2001
- 17
-
IT Governance: The Role of the IT Auditor in IT GovernanceHardy, G. | 2009
- 17
-
Global Perspectives: IT GovernanceFonseca, Dante Ferrini / Mustafa, Erol | 2006
- 17
-
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley ActAlles, M. / Kogan, A. / Vasarhelyi, M. | 2004
- 17
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 17
-
Commentary - The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley ActAlles, Michael / Kogan, Alexander / Vasarhelyi, Miklos | 2004
- 17
-
Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 18
-
IT Value: IT Project Cancellations: Pay Now or Pay LaterThorp, John | 2008
- 18
-
Businesses Today Are Undergoing a Chemical ChangeLainhart, J. W. | 2001
- 18
-
Performing a Security Risk AssessmentSchmittling, R. / Munns, A. | 2010
- 18
-
IT Governance - Businesses Today Are Undergoing a Chemical Change - John W Lainhart IV, CISA, reports on the changes impacting businesses today in the wake of the e-commerce revolution and points out the need for IT governance to keep control over the enterprise's investment.Lainhart IV, John W. | 2001
- 19
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. | 2000
- 20
-
The IS Audit ProcessSayana, S. A. | 2002
- 20
-
CobiT 4.0 By IT Governance InstituteSingh-Latulipe, R. | 2006
- 20
-
IT Audit Basics - The IS Audit Process - S. Anantha Sayana, CISA, CIA, writing the first of the Journal's new column, focuses on the audit process -- What it is and what it involves.Sayana, S.Anantha | 2002
- 20
-
Virtual Private Networking-New Issues for Network SecurityShue, L. | 2001
- 20
-
Features - Virtual Private Networking -- New issues for Network Security - Enterprises today recognize the need for global outreach to ensure success. Providing network connectivity through VPNs answers the need for worldwide access, but raises new security issues as well. A preview of the upcoming information Systems Audit and Control Foundation research publication.Shue, Lily | 2001
- 20
-
Val IT: From the Vantage Point of the COBIT 4.0 Pentagon Model for IT GovernanceSingh-Latulipe, Rob | 2007
- 20
-
Book Review: COBIT 4.0 - IT Governance InstituteSingh-Latulipe, Rob | 2006
- 20
-
Book Review: Oracle Security Privacy AuditingNanda, Arup / Burleson, Don | 2005
- 21
-
Book Review: Outsourcing Information SecurityAxelrod, C.Warren / Emani, Sarathy | 2006
- 21
-
Standards, Statements and Guidelines - ISACA(R) Member and Certification Holder Compliance| 2005
- 21
-
Using CAATs to Support IS AuditSayana, S. A. | 2003
- 21
-
Outsourcing Information Security By C. Warren AxelrodEmani, S. | 2006
- 21
-
IT Audit Basics - Using CAATs to Support IS AuditSayana, S.Anantha | 2003
- 22
-
Book Review: Auditor's Guide to Information Systems AuditingRafeq, A. | 2008
- 22
-
Essentials of Knowledge Management By Bryan BergeronKanhere, V. | 2006
- 22
-
IT Value: The Challenges of Implementing Portfolio ManagementHarries, S. / Harrison, P. | 2009
- 22
-
Book Review: Essentials of Knowledge ManagementBergeron, Bryan / Kanhere, Vishnu | 2006
- 23
-
New Book Addresses Online Signature Authentication| 2000
- 23
-
Watchdog or Bloodhound? The Push and Pull Toward a New Audit ModelSarup, D. | 2004
- 23
-
IT Governance: Why Information Security Governance Is Critical to Wider Corporate Governance Demands -- A European PerspectivePoole, Vernon | 2006
- 23
-
Commentary - Watchdog or Bloodhound? The Push and Pull Toward a New Audit ModelSarup, Deepak | 2004
- 23
-
Perspective - The Y2K Bug -- A Vaccine Against Terror Attacks? - The author examines the significance and value of Y2K preparations in light of recent terror attacks.Paliotta, Allan R. | 2002
- 23
-
Helping Businesses Safeguard Information and NetworksHale, R. | 2001
- 23
-
The Y2K Bug-A Vaccine Against Terror Attacks?Paliotta, A. R. | 2002
- 23
-
Key Elements of an Information Security ProgramPironti, John P. | 2005
- 23
-
Features - Helping Businesses Safeguard Information and Networks - Companies face increasing financial risk due to online fraud and other threats to their e-business systems. Managed intrusion detection and authentication services are being launched as a way to render networks and data more secure.Hale, Ron | 2001
- 23
-
Features - New Book Addresses Online Signature Authentication - Excerpts from a new ISACF book Digital Signatures- Security and Controls that complement additional articles on e-mail security are presented here| 2000
- 24
-
Security Architecture: One Practitioner's ViewScammell, T. | 2003
- 24
-
Business Risks and Security Assessment for Mobile DevicesMilligan, Patricia Mayer / Hutcheson, Donna | 2008
- 24
-
IT Audit Basics: Systems Development Life Cycle and IT AuditsSingleton, Tommie W. | 2007
- 24
-
Commentaries - Security Architecture: One Practitioner's ViewScammell, Tim | 2003
- 25
-
Features - Analysis Software for Auditors and Management - The author makes a case for auditors including data mining software such as WizRule in their regular audit "survival kits."Denker, Bob | 2001
- 25
-
Analysis Software for Auditors and ManagementDenker, B. | 2001
- 26
-
Risk Landscape of Cloud ComputingRaval, V. | 2010
- 27
-
Are E-mails Boon or Bane for Organisations?Pathak, J. P. | 2000
- 27
-
Commentary: Preparing for the CISA or CISM Examination: A Brief, Hands-on Supplement for CandidatesOliver, Derek J. / Shanahan, Max | 2006
- 27
-
Preparing for the CISA or CISM Examination: A Brief, Hands-on Supplement for CandidatesOliver, D. J. / Shanahan, M. | 2006
- 27
-
Features - Are E-mails Boon or Bane for Organisations? - This timely article investigates corporate liabilities such as documents that leave an organization without management approval and offers safeguardsPathak, J.P. | 2000
- 27
-
IT Governance - IT Governance and Its MechanismsHaes, Steven De / Grembergen, Wim Van | 2004
- 27
-
IT Governance and Its MechanismsDe Haes, S. / Van Grembergen, W. | 2004
- 28
-
Using COBIT as a Tool to Lead Enterprise IT OrganizationsLambeth, John | 2007
- 28
-
Features - Risk and Control Self-Assessment (RCSA): A Useful Complement to Information Systems Audits at Stanford University - The Stanford University Internal Audit Department uses risk and control self-assessment to complement its audit services. The authors describe the purpose of RCSA, how the sessions are conducted, in what contexts and the useful information they glean from them.Chakravarty, Ranjira / Topper, Frank | 2001
- 28
-
Features - Business Continuity: A Business Survival Strategy - Business continuity plans (BCP) are no longer a luxury, but an essential element of an organisation's risk management programme. The emphasis for business continuity today is on the organisation's critical business processes that need to be recovered in the event of a disaster for the survival of the organisation.Doughty, Ken | 2002
- 28
-
Risk and Control Self-Assessment (RCSA): A Useful Complement to Information Systems Audits at Stanford UniversityChakravarty, R. / Topper, F. | 2001
- 28
-
Business Continuity: A Business Survival StrategyDoughty, K. | 2002
- 29
-
Practicing Information Technology Auditing for FraudJohnstone, Dale / Chung Yee Wong, Ellis | 2008
- 30
-
Commentary: Why Companies Are Not Implementing Audit, Antifraud and Assurance Software...and How to Fix ItBrooks, Dean / Lanza, Rich | 2006
- 30
-
Why Companies Are Not Implementing Audit, Antifraud and Assurance Software...and How to Fix ItBrooks, D. / Lanza, R. | 2006
- 30
-
Commentaries - Continuous Assurance: We Are Way OverdueKneer, Dan C. | 2003
- 30
-
Continuous Assurance: We Are Way OverdueKneer, D. C. | 2003
- 30
-
Common Criteria: An OverviewMookhey, K.K. | 2005
- 32
-
Getting Buy-in-An Easier WayKonrad, C. | 2009
- 32
-
IT Governance: Interdependence of COBIT and ITILFabian, Robert | 2007
- 32
-
Guidance on Aligning COBIT, ITIL and ISO 17799Hardy, Gary | 2006
- 32
-
Secure E-BusinessMehta, R. | 2000
- 32
-
Features - Secure E-Business - In this article the author describes the many risks and concerns for conducting electronic business and makes comparisons among the several methods to make business transactions more secureMehta, Raj | 2000
- 32
-
Criteria and Methodology for GRC Platform SelectionSingh, A. / Lilja, D.J. | 2010
- 33
-
Is Your Printer Betraying Your Business?Farao, Esteban | 2008
- 33
-
Implications for the Future of COBIT Systems in Higher Education: Putting Critical Research and Theory Into PracticeCouncil, Claude L. | 2007
- 33
-
Features - Electronic Commerce System Sophistication and the Audit Process: Insights from Information Systems Auditors - The authors relate the results of a survey on the sophistication of implementation strategies and overall control concerns of electronic commerce systems, conducted among the members of the Chicago Chapter of the Information Systems Audit and Control Association.Stein, Douglas M. / Arunachalam, Vairam / Rittenberg, Larry E. | 2001
- 33
-
Electronic Commerce System Sophistication and the Audit Process: Insights from Information Systems AuditorsStein, D. M. / Arunachalam, V. / Rittenberg, L. E. | 2001
- 34
-
ZFPAudit: A Computer-assisted Audit Tool for Evaluation of Microsoft Operating SystemsBek, J. | 2004
- 34
-
ISO 17799: Then, Now and in the FutureSweren, Scott H. | 2006
- 34
-
Case Study - ZFPAudit: A Computer-assisted Audit Tool for Evaluation of Microsoft Operating SystemsBek, Jon | 2004
- 35
-
Continuous Audits: Taking the PlungeNehmer, Robert | 2003
- 35
-
Threat Assessment and Security Measures Justification for Advanced IT NetworksCerullo, Michael J. / Cerullo, Virginia | 2005
- 35
-
The Unconquered Monitoring Frontier: Time for a Real-time Command CenterUnwala, Huzeifa / Dharmadhikari, Milind | 2008
- 35
-
Green SecurityJones, A. | 2009
- 37
-
Black Box Logging and Tertiary Monitoring of Continuous Assurance SystemsAlles, Michael / Kogan, Alexander / Vasarhelyi, Miklos | 2003
- 37
-
New Basel Accord: Operational Risk Management-Emerging Frontiers for the ProfessionBhatia, M. | 2002
- 37
-
Features - New Basel Accord: Operational Risk Management -- Emerging Frontiers for the Profession - The new Basel Accord is attempting to sensitize banks towards the risks they undertake in carrying out business. This article outlines the nature of operational risk management and explains how IS audit and control professionals can contribute to this emerging area.Bhatia, Mohan | 2002
- 37
-
Case Study: A Cosmological Approach to IT Governance: Val IT and COBIT Lessons Learned at the United NationsBellone, Jason / Dell'Accio, Dino Cataldo / Rodriguez, Juan | 2007
- 37
-
Compliance Audit-A Process of Optimization, Not an ObligationMehta, A. | 2009
- 38
-
ITIL in a Complex World: Focusing on Success in a Multisourced EnvironmentLonsdale, Derek / Clark, Wendy / Udvadia, Bina | 2006
- 38
-
Managing the Insider Threat: Data SurveillanceMoynihan, John | 2008
- 38
-
Availability Risk Assessment-A Quantitative ApproachHariharan | 2010
- 39
-
Security Issues in a Continuous Reporting EnvironmentGal, G. | 2009
- 39
-
Open Source Tools for Security and Control AssessmentMookhey, K.K. | 2004
- 40
-
Features - OS-390...But Why? Background to the Reliability and Availability of OS-390 Mainframes - Why is OS-390 generally considered so reliable, well controlled and manageable, especially suited for business-critical applications? Why is it considered a serious candidate for UNIX applications and web servers? The author examines the internal structure and security of OS-390.Mienes, Peter | 2001
- 40
-
Measuring the Readability of Software Requirement Specifications: An Empirical StudyKanter, Howard A. / Muscarello, Thomas J. / Ralston, Christopher | 2008
- 40
-
OS/390...But Why? Background to the Reliability and Availability of OS/390 MainframesMienes, P. | 2001
- 40
-
Audit and Assurance of Information Systems and Business Processes: A Foundation for Providing Sound Governance Decision MakingFinne, Thomas | 2006
- 41
-
Features - Intellectual Property and the Internet: Who Owns the Information? - One cannot think about e-mail and Internet security without keeping a watchful eye on the dynamic questions and answers regarding intellectual property. This article explores the current nuancesParkes, Hugh | 2000
- 41
-
Intellectual Property and the Internet: Who Owns the Information?Parkes, H. | 2000
- 42
-
Company Perspectives on Business Value of IT Investments in Sarbanes-Oxley ComplianceVelichety, Swapna / Park, Jeongil / Jung, Sungkun / Lee, Sooyoun / Tanriverdi, Hüseyin | 2007
- 42
-
Internet Financial ReportingPoon, Pak-Lok / Li, David / Yu, Yuen Tak | 2003
- 42
-
Looking at IT Risk DifferentlyRameshkumar, A.V. | 2010
- 43
-
The New Compliance BackgroundMehdizadeh, Yahya | 2006
- 44
-
Insuring Information Security: Commercial Insurance as an Information Security DriverPollitt, M. M. | 2002
- 44
-
Features - Insuring Information Security: Commercial Insurance as an Information Security Driver - This article examines how the insurance market addresses risks resulting from failures of information security practices and how the insurance industry's goal of seeking maximum profit while minimizing risk may drive the evolution of information security standards.Pollitt, Mark M. | 2002
- 44
-
Database Activity Monitoring: An Emerging Technology for Audit and CompliancePinch, M. | 2009
- 44
-
Compliance for Compliance's Sake?Sollis, D. | 2010
- 45
-
Web Services SecurityBhatia, Mohan | 2005
- 45
-
Automating System Security AuditsPinkett, Fred | 2004
- 46
-
Insider Threat -- The Fraud That Puts Companies at RiskTaylor, Patrick | 2008
- 46
-
IT Merger Due Diligence: A BlueprintBhatia, Mohan | 2007
- 46
-
Plus - CPE Quiz #68Oringel, Joey | 2000
- 47
-
Making CA Work in a Globally Critical Bank SystemHessler, Ralph / Ranade, Jan | 2003
- 47
-
Using Spreadsheets and Benford's Law to Test Accounting DataSimkin, M.G. | 2010
- 47
-
Employee Monitoring and Surveillance -- The Growing TrendWakefield, Robin L. | 2004
- 48
-
Nuevas Tecnologías Desplegadas con Inteligencia, ?Serán las Aliadas de los Profesionales de Auditoría de TI en las Grandes Corporaciones?Soria, Diego Martín | 2008
- 48
-
Nuevas Tecnologias Desplegadas con Inteligencia, ¿Seran las Aliadas de los Profesionales de Auditoria de TI en las Grandes Corporaciones?Soria, D.M. | 2008
- 48
-
Overview of Mobile TechnologySmith, Matt | 2006
- 49
-
Auditing Employee Use of E-mailMoody, Robert / Serepca, Beth | 2003
- 49
-
Disaster Recovery and Business Continuity Planning: Testing an Organization's PlansMusaji, Y. F. | 2002
- 49
-
Cost-effective Implementation of Identity ManagementSarva, Srinivas | 2005
- 49
-
Features - Disaster Recovery and Business Continuity Planning: Testing an Organization's Plans - Putting the pieces together following a disaster is not just dependent on technology but involves people and communication and the recognition that any problems can be solved only through superior personal leadership skills combined with positive, strategic communication and in trouble-shooting tough, touchy, sensitive corporate communications issues.Musaji, Yusufali F. | 2002
- 49
-
Risk Associated With Web Application VulnerabilitiesFath, K. / Ott, J. | 2009
- 50
-
Road Map to XBRL Adoption as New Reporting ModelSrinivas, Sarva | 2004
- 50
-
Case Study: Continuous Auditing Comes of AgeBrennan, Gerard | 2008
- 51
-
The Dynamics of Privacy RiskAxelrod, C.Warren | 2007
- 51
-
The Role of Attack Simulation in Automating Security Risk ManagementCohen, Gidi | 2005
- 52
-
Sarbanes-Oxley -- Considerations for a Framework for IT Financial Reporting ControlsFox, Christopher | 2004
- 52
-
The New World of Risk-based Regulation (Part 2)Micallef, Mario | 2008
- 53
-
Impact of SAS No. 94 on Computer Audit TechniquesCerullo, M.Virginia / Cerullo, Michael J. | 2003
- 53
-
The Future of Key ManagementMartin, L. / Noll, L. / Randall, J. | 2009
- 53
-
Driving New Value From IT Risk ManagementWesterman, G. / Barnier, B. | 2010
- 55
-
Control Self-assessment for Information and Related TechnologyBakshi, Sunil | 2004
- 55
-
Help Source Q& ASubramaniam, Gan | 2006
- 56
-
Plus - CE Quiz #80, Based on Volume 5, 2001Oringel, Joey | 2002
- 57
-
Excerpt: IT Governance Roundtable| 2008
- 58
-
Preserving Electronically Encoded EvidenceDavis, R.E. | 2009
- 59
-
CPE Quiz #110 - Based on Volume 5, 2006Rafeq, A. | 2007
- 59
-
CPE Quiz #86, based on volume 5, 2002Oringel, Joey | 2003
- 59
-
CPE Quiz #97 - Based on volume 4, 2004Chan, Sally | 2005
- 59
-
CPE Quiz #104 - Based on Volume 5,2005Chan, Sally | 2006
- 62
-
Plus - CE Quiz #74, Based on Volume 5, 2000, IS Auditing and the 21st Century: Are We Prepared?Oringel, Joey | 2001
- 63
-
CPE Quiz #116 - Based on Volume 5, 2007Chan, Sally | 2008
- 63
-
How to Use a New Computer Audit Fraud Prevention and Detection ToolLanza, Richard B. | 2004
- 67
-
CPE Quiz #91, based on volume 4, 2003Oringel, Joe | 2004
-
ISACA Bookstore Price List Supplement| 2008
-
Plus - ISACA Bookstore Price List Supplement| 2002
-
Plus - ISACATM Bookstore Price Last Supplement| 2001
-
Plus - ISACA Bookstore Offerings - Supplement| 2000