Help Source Q&A (Ohne Sprachangabe)

  • ISSN:
  • Aufsatz (Zeitschrift)  /  Print

Inhaltsverzeichnis – Band 4

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

5
Issues & Comments Editor in Chief Michael Cangemi, CISA, CPA, discusses an Internet security policy forum, at which he spoke along with others from the industry and government, including Dr. Condoleezza Rice, US President George W. Bush's national security advisor. The forum's goal was to elevate computer security interest to the highest-level agendas of senior corporate management
| 2001
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA presents the ideas that came out of the Critical Infrastructure Assurance Summit in Washington DC and the results of the PricewaterhouseCoopers Technology Forecast
Cangemi, Michael P. | 2000
5
IS Security Matters: Compliance and Beyond
Ross, Steven J. | 2007
5
Taking A Look Back: Are We Really Doing Enough? The Current State of Computer Auditing Excerpted and reprinted from The EDP Auditor Journal, volume IV, 1991
| 2009
5
Guest Editorial: A Rogue Trader Strikes Again!
Sarup, Deepak | 2008
5
Editorial - Issues & Comments
Cangemi, Michael | 2004
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses an Internet security policy forum, at which he spoke along with others from the industry and government, including Dr. Condoleezza Rice, US President George W. Bush's national security advisor. The forum's goat was to elevate computer security interest to the highest-level agendas of senior corporate management.
Cangemi, Michael | 2001
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, highlights the importance of improving credibility of financial reporting. He also discusses the double-edged sword of customer relationship management.
Cangemi, Michael | 2002
6
Guest Editorial: Managing IT Governance Through Market Turbulence
Zarrella, E. | 2009
8
Identity Architecture
Ross, S. J. | 2003
8
IS Security Matters: The Right Question
Ross, Steven J. | 2006
8
IS Security Matters - Identity Architecture
Ross, Steven J. | 2003
8
e-Commerce Security: Trading Partner Identification, Registration and Enrollment
Kinczkowski, L. M. | 2002
9
IS Security Matters: Managing Information Crises
Ross, Steven J. | 2008
9
IT Audit Basics: Emerging Technical Standards on Financial Audits: How IT Auditors Gather Evidence to Evaluate Internal Controls
Singleton, Tommie | 2007
9
Mail Call II
Ross, S. J. | 2004
9
IS Security Matters: Let's Go, Vets
Ross, S.J. | 2009
9
Claves Para El Gobierno de los Systemas de Informacion, comentarios Las notas a este libro presentan como los autores integran informacion sobre controles, planificacion de contingencias, mejora de procesos, tratamiento de recursos humanos, restricciones legales en las organizaciones y el marco de referencia COBIT⊙
Tello, J. | 2001
9
IS Security Matters - Mail Call II
Ross, Steven J. | 2004
9
IS Security Matters - Steve Ross, CISA, considers privacy and the predictions of dire consequences related to the advance of technology and the growth of the Internet. He counters these predictions by presenting how market forces currently keep violations of privacy under control
Ross, Steve | 2000
10
IS Security Matters - Mail Call - Steven J. Ross, CISA, responds to mail he received in response to previous columns on topics including the value of international standards, virtual private infrastructures and the tragedies of 11 September 2001.
Ross, Steven J. | 2002
11
IT Audit Basics: What Every IT Auditor Should Know About Access Controls
Singleton, Tommie W. | 2008
11
IT Audit Basics: Audit Concerns: Looking at ERP Application Integration and Implementation Issues
Gallegos, Fred | 2006
11
Financial Information Systems Manual 1999 Edition
Emani, S. | 2000
11
e-Commerce Security-Business Continuity Planning
Kinczkowski, L. M. | 2003
11
Penetrating Questions Steven J. Ross discusses society's glorification of the hacker, the difference between a penetration tester and a criminal-the skills are the same, it is just a difference in application and integrity, and the importance of penetration testers
| 2001
11
Book Reviews - Financial Information Systems Manual 1999 Edition - An overview of the 1999 edition of this manual, which covers the requirements, design, implementation and management of financial information systems
Emani, Sarathy | 2000
11
IS Security Matters - Penetrating Questions - Steven J Ross discusses society's glorification of the hacker, the difference between a penetration tester and a criminal -- The skills are the same, it is just a difference in application and integrity, and the importance of penetration testers.
Ross, Steven J. | 2001
12
IT Audit Basics: What Every IT Auditor Should Know About Scoping an IT Audit
Singleton, T.W. | 2009
13
Book Reviews - Network Intrusion Detection -- An Analyst's Handbook - A look at a book which enables anyone to understand and take part in network intrusion detection work
Whittaker, James | 2000
13
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for ISACATM membership and the CISA(R) designation are outlined and the status of ISACA issuances noted.
| 2002
13
Asking the Right Questions for IT Governance Erik Guldentops, CISA, presents a view of the importance of and need for corporate governance regulations and standards for overall enterprise governance. He notes that while it is not the most efficient IT governance process, asking the tough questions is an effective way to get started. To this effect, he provides a list of questions to help an organization begin
| 2001
13
Auditing: A Risk Analysis Approach, 5^t^h Edition-By Larry F. Konrath
Bettex, E. J. | 2003
13
Corporate Governance
Sel, M. | 2004
13
IT Governance: Outsourcing IT Governance to Deliver Business Value
Blecher, Max | 2007
13
Network Intrusion Detection - An Analyst's Handbook
Whittaker, J. | 2000
13
Standards and guidelines for maintaining compliance for ISACA™ membership and the CISA® designation are outlined and the status of ISACA issuances noted
| 2002
13
IT Governance - Asking the Right Questions for IT Governance - Erik Guldentops, CISA, presents a view of the importance of and need for corporate governance regulations and standards for overall enterprise governance. He notes that while it is not the most efficient IT governance process, asking the tough questions is an effective way to get started. To this effect, he provides a list of questions to help an organization begin.
Guldentops, Erik | 2001
13
IT Governance - Corporate Governance
Sel, Marc | 2004
15
Kennametal Uses ACL as Its Best Practices Tool
McMunn, H. | 2000
15
Case Study - Kennametal Uses ACL as Its Best Practices Tool - Security and data integrity are major issues when moving from legacy systems to new enterprise management systems. Holly McMunn, CPA, CIA, the manager of internal audit at Kennametal, describes their use of ACL for Windows during post-implementation audits of SAP
McMunn, Holly | 2000
15
Auditing Security and Privacy in ERP Applications
Sayana, S. A. | 2004
15
Knowing the Environment: Top Five IT issues
Guldentops, E. | 2002
15
Maturity Measurement-First the Purpose, Then the Method
Guldentops, E. | 2003
15
IT Audit Basics - Auditing Security and Privacy in ERP Applications
Sayana, S.Anantha | 2004
15
IT Governance - Knowing the Environment: Top Five IT Issues - Erik Guldentops, CISA, discusses the most pressing IT issues of the day. The list, developed by the IT Governance Institute, views the important IT issues to be governance-related, not technology-related.
Guldentops, Erik | 2002
15
Commentary - Maturity Measurement -- First the Purpose, Then the Method
Guldentops, Erik | 2003
16
Fraud Examination & Prevention By W. Steve Albrecht and Chad O. Albrecht
Felker, M. | 2007
16
Book Review: Fraud Examination & Prevention
Albrecht, W.Steve / Albrecht, Chad O. / Felker, Mikhael | 2007
16
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance
| 2008
17
IT Value: Five Steps to Introducing Val IT: Applying Val IT to Introduce or Improve Value Management in an Enterprise
Harries, Sarah / Harrison, Peter | 2008
17
How to Audit Customer Relationship Management (CRM) Implementations While acknowledging the importance of CRM technology, the author discusses the importance of evaluating CRM implementations, arguing that not all attempts at CRM are successful. She provides a list of steps to conduct a straightforward audit of CRM implementations
Balcazar, P. | 2001
17
Perspective - How to Audit Customer Relationship Management (CRM) Implementations - While acknowledging the importance of CRM technology, the author discusses the importance of evaluating CRM implementations, arguing that not all attempts at CRM are successful. She provides a list of steps to conduct a straightforward audit of CRM implementations.
Balcazar, Priscila | 2001
17
The Audit Report and Follow-up: Methods and Techniques for Communicating Audit Findings and Recommendations
Gallegos, F. | 2002
17
IT Governance: A Road Map for Regulatory Compliance
Annaswamy, S. | 2009
17
IT Audit Basics - The Audit Report and Follow-up: Methods and Techniques for Communicating Audit Findings and Recommendations - Fred Gallegos, CISA, CGFM, CDE, discusses the audit report, the key deliverable for the audit. He breaks down the methods and techniques for assessing the audit as well as the auditor and for communicating audit findings and recommendations.
Gallegos, Fred | 2002
18
IT Governance: Linking Business Goals to IT Goals and COBIT Processes
Grembergen, Wim Van / Haes, Steven De / Moons, Jan | 2005
18
ISACA® Member and Certification Holder Compliance
| 2004
19
Commantrary - Security and Regulatory Compliance: A Quantitative Risk Management Approach
Drake, Art / Jeschke, Jerry | 2004
19
Perspectives - Why Rein in Linux? - Underneath all the hype, sometimes it's hard to answer the question: What is Linux? The author gives a compact explanation of the history and development of Linux, compares and contrasts several versions of it, reviews uses for it, discusses tools for controlling it and relates his own experiences in installing it
Norris Jr, Robert C. | 2000
19
Security and Regulatory Compliance: A Quantitative Risk Management Approach
Drake, A. / Jeschke, J. | 2004
19
Why Rein in Linux?
Norris, R. C. | 2000
20
IT Value: Portfolio Management -- Unlocking the Value of IT Investments
Ataya, Georges / Thorp, John | 2007
20
Five Questions With...
Slocumb, Ray | 2008
21
Enabling the Strategy-focused IT Organization
Gold, R. S. | 2002
21
Coordinating IT Governance-A New Role for IT Strategy Committees
Hardy, G. | 2003
21
IT Governance - Coordinating IT Governance -- A New Role for IT Strategy Committees
Hardy, Gary | 2003
21
Enabling the Strategy-focused IT Organization - IT often focuses on reducing cost and keeping systems running, while the business needs IT to emphasize value creation. To move beyond merely proving their competence, IT managers are using the balanced scorecard management framework.
Gold, Robert S. | 2002
21
The Costs of Not Securing Personally Identifiable Data
Wright, B. | 2004
21
The Costs of Not Securing Personally Identifiable Da
Wright, Benjamin | 2004
22
IT Governance: New Framework for Enterprise Risk Management in IT
Fischer, Urs | 2008
22
Managing Multiple Medium- and Small-scale Projects in Large IT Organizations
Swaroop, Shankar | 2007
23
Virtual Private Network (VPN): Audit Approach Based on Standard SDLC Concepts
Ledesma, Cristina / Ott, John G. | 2004
24
Global Perspectives
Cano, Jeimy J. / Mitchell, John / Koo, Peter | 2006
25
Book Review: Securing Converged IP Networks
Parmar, Kamal | 2008
25
E-mail Records and Knowledge Management: The Hidden Risk - E-mail records can provide important clues and knowledge about how decisions are made and the time frame in which they were made. The fact that the management of electronic information too often lies below the radar screens means that the storage and archiving of e-mail has not been given the priority it deserves.
Wilkins, Adam | 2002
25
IT Governance: IT Audit Role
Gallegos, F. | 2003
25
E-mail Records and Knowledge Management: The Hidden Risk
Wilkins, A. | 2002
25
Implementing ISO17799: Pleasure or Pain?
Thorp, Carl | 2004
25
Book Review: Governance, Risk and Compliance Handbook: Technology, Finance, Environmental, and International Guidance and Best Practices
Rafeq, A. | 2009
25
IT Audit Basics - IT Governance: IT Audit Role
Gallegos, Frederick | 2003
26
Book Review: Business Continuity and Disaster Recovery for IT Professionals
Nedelchev, Naiden | 2008
26
Book Review: Implementing the ISO/IEC 27001-Information Security Management System Standard
Kanhere, V. | 2009
27
Systems Development Advice in a Web-enabled World
Kumar Agarwala, Sanjiv | 2004
27
Perspectives - IT Governance Roundtable -- Sponsored by the IT Governance Institute - A summary of the roundtable discussion which occurred on 27 March 2000 at the Euro CACS 2000 in Oslo, Norway
Penri-Williams, Hugh | 2000
27
IT Governance Roundtable
Penri-Williams, H. | 2000
28
Book Review: Information Technology Control and Audit, 2^n^d Edition By Frederick Gallegos, Sandra Senft, D.P. Manson and C. Gonzales
Kanhere, V. | 2006
28
Book Review: Information Technology Control and Audit, 2nd Edition
Gallegos, Frederick / Senft, Sandra / Manson, D.P. / Gonzales, C. / Kanhere, Vishnu | 2006
28
Information Technology Control and Audit, 2^n^d Edition By Frederick Gallegos, Sandra Senft, D.P. Manson and C. Gonzales
Kanhere, V. | 2005
28
Book Review: Balanced Scorecard Step-by-step: Maximizing Performance and Maintaining Results, 2nd Edition
Fuente, Reynaldo J.de la | 2008
28
Effect of Third Parties on an Organization's IT Controls - The concept of outsourcing has been around for years. However, in recent years, there has been a marked increase in the use of third-party service providers. The impact that third parties have on an organization can vary dramatically - ISACA Standards Board
| 2002
28
Optimizing an Organization's Security Effectiveness by Using Vulnerability Management to Support the Audit Function
Bunker, Eva | 2003
28
The Many Faces of SAP Connectivity in E-Commerce The author examines how SAP fits into the collaborative business relationship process and discusses the changing face of SAP in the e-commerce world. He argues that companies that miss the application integration with the web will not remain competitive
Johnson, R. | 2001
28
Effect of Third Parties on an Organization's IT Controls
ISACA Standards Board | 2002
28
Perspective - The Many Faces of SAP Connectivity in E-Commerce - The author examines how SAP fits into the collaborative business relationship process and discusses the changing face of SAP in the e-commerce world. He argues that companies that miss the application integration with the web will not remain competitive.
Johnson, Robert | 2001
29
Book Review: Fraud Casebook: Lesson From the Bad Side of Business
Kanhere, Vishnu | 2008
29
Security Controls That Work
Melanon, Dwayne | 2007
29
Common Web Application Vulnerabilities
Kennedy, Susan | 2006
29
Identify, Govern and Manage IT Risk Part 1: Risk IT Based on CobiT Objectives and Principles
Fischer, U. | 2009
29
Book Review: Fraud Casebook: Lessons From the Bad Side of Business
Kanhere, V. | 2008
31
Assuring Data Privacy Compliance
Kenny, Steve | 2004
31
A Comprehensive Method for Assessment of Operational Risk in E-banking
Tanampasidis, George | 2008
31
Preventing EFT Fraud
Humphries Jr, John E. | 2003
31
Features - BSD -- The Other Open Source Unix - While Linux has been garnering media attention, another open source operating system has continued with its many tasks, including helping run many of the Internet's busiest sites. This article contains a brief summary of the history of BSD and its current place in the operating systems world
| 2000
31
BSD - The Other Open Source Unix
| 2000
33
Information Technology Auditing and Facilitated Control Self-assurance
Doughty, K. / O Driscoll, J. | 2002
33
Your Face to the Customer: What If It Is Wrong? Managing CRM Risks To better manage the enterprise around customer interactions and to maximiz the lifetime value of customer relationships, the organization must change and leverage information technology to make organizational, process, application and technology changes within their sales, marketing and customer service functions. These functions are inherently risky, because they are so visible and closely linked to customers
McLaughlin, M. / Erickson, D. S. | 2001
33
Approaches to Monitor Activities in Oracle Database
Shi, Ying | 2007
33
Radio Frequency Identification: What Does It Mean for Auditors?
Serepca, Beth / Moody, Bob | 2006
33
Features - Your Face to the Customer. What If It Is Wrong? Managing CRM Risks - To better manage the enterprise around customer interactions and to maximize the lifetime value of customer relationships, the organization must change and leverage information technology to make organizational, process, application and technology changes within their sales, marketing and customer service functions. These functions are inherently risky, because they are so visible and closely linked to customers.
McLaughlin, Michele / Erickson, David S. | 2001
33
Information Technology Auditing and Facilitated Control Self-assurance - This article outlines one approach used by IT auditors to provide an annual assessment of the IT&T internal control framework within an organisation. It is based on a set of internationally recognised IT service delivery and support process models called ITIL (Information Technology Infrastructure Library) and relies extensively on the use of control self-assurance (CSA) workshops facilitated by IT audit staff.
Doughty, Ken / O'Driscoll, John | 2002
33
Understanding How to Protect Web-facing Applications: Under the Covers of Requirement 6.6 of PCI
Nair, S. / Drew, D. / Verderber, P. | 2009
34
Features - Extracting Data from SAP - This article focuses on explaining how computer assisted auditing tools (CAATs) can help an auditor extract data from SAP during the auditing process. The author includes a case example involving ABAP 4 Query and walks auditors through producing a query to extract data
Powers, Bernard J. | 2000
34
Extracting Data from SAP
Powers, B. J. | 2000
35
Look Beyond Sarbanes-Oxley to Maximize ROI from Compliance Initiatives
Welu, Tim | 2004
35
Identity and Access Management
McQuaide, Bill | 2003
36
A Manager's Guide to Identity Management and Federated Identity
Pang, Leslie | 2005
36
MP3 Players: Today's Business Threat
Oliver, Derek | 2007
37
COBIT in Relation to Other International Standards
Heschl, Jimmy | 2004
37
The OCTAVE® Approach to Information Security Risk Assessment
Panda, P. | 2009
38
Risk Management Standards: The Bigger Picture
Ramirez, David | 2008
39
Securing Linux - Is Open Source Too Open for Its Own Good?
Loshin, P. | 2000
39
IT and Shareholder Return: Creating Value in the Insurance Industry
Williams, Paul / Spangenberg, John / Kovaleva, Sonja | 2007
39
Laser Check Printing -- Its Effect on the Internal Control System - Laser check printing is a fast-growing technology that holds the promise of increased fraud control and reduced operating costs. This article investigates the effect of laser check printing on internal control systems.
Gorgoglione, Janice / Joseph, Gilbert W. | 2002
39
Laser Check Printing-Its Effect on the Internal Control System
Gorgoglione, J. / Joseph, G. W. | 2002
39
Enforce Security with a Fingerprint Biometric Solution
Wallhoff, John | 2003
41
Automating Security Policy and Procedures With Workflow: How to Improve the Effectiveness of Risk Management Solutions
Godfrey, Michael | 2008
41
Auditing Linux
Hoesing, Michael T. / Raval, Vasant | 2005
41
Features - Expectations Are High for CRM, But So Are the Challenges - While some enterprises forge ahead with CRM initiatives, other companies that wait until after a crisis to implement or update CRM processes may pay a heavy toll. Higher consumer expectations require the ability to react quickly, respond thoroughly and add value to the process.
Ward, Michael | 2001
41
Expectations Are High for CRM, But So Are the Challenges While some enterprises forge ahead with CRM initiatives, other companies that wait until after a crisis to implement or update CRM processes may pay heavy toll. Higher consumer expectations require the ability to react quickly, respond throughly and add value to the process
Ward, M. | 2001
41
Biometrics -- Risks and Controls
Dimitriadis, Christos K. / Polemi, Despina | 2004
41
Features - Securing Linux -- Is Open Source Too Open for Its Own Good? - Although Linux can be made to be far more secure than Windows, problems can arise when inexperienced end-users install the operating system and applications inside your organizational infrastructure. Pete Loshin explains the risks and the remedies for Linux security. The article also includes sidebars on the Bastille Linux Project, OpenBSD and Linux firewalls
Loshin, Pete | 2000
42
The Impact of Laws and Regulations on Mobile Technology
Lewis, B.D. | 2009
43
Environment Interaction Evaluation: Building Proactive Compliance Into Technology Solutions
Deshmukh, Meera / Shankar, Raj | 2007
44
The Auditor's Role in IT Development Projects
Hettigei, Nandasena T. | 2005
44
Internal Control Issues: The Case of Changes to Information Processes
Bae, Benjamin / Epps, Ruth W. / Gwathmey, Susan S. | 2003
44
Protecting the Ports -- Using an Event Log Manager to Improve Network Security
Robb, Drew | 2004
45
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISA(R) designation are outlined and the status of ISACA issuances noted.
| 2001
45
Standards and guidelines for maintaining compliance for both ISACA™ membership and the CISA designation are outlined and the status of ISACA issuances noted
| 2001
45
Case Study: Better to Prevent Than Cure -- A New Way to Enhance IT and Business Governance Collaboration
Help, Tuulikki | 2008
46
Achieving Compliance With the PCI Data Security Standard
Woda, Alex | 2007
46
Views on COBIT 2nd Edition Relayed Online
| 2000
46
Features - Views on COBIT 2nd Edition Relayed Online - The summary of the COBIT 2nd Edition online survey, conducted in November and December of 1999
| 2000
46
Mitigating Risky Employee Behavior During and Economic Downturn
Charnock, E. | 2009
46
Effective Encryption Requires an Integrated System
Farris, Greg | 2004
47
Centralized Security Management Provides Foundation for Effective Intrusion Prevention
Njemanze, Hugh S. | 2003
47
Manager's Guide to Enterprise Resource Planning (ERP) Systems Over the last decade, many organizations have experienced significant changes in their core business applications. To address these many changes, a new type of software system was developed-enterprise resource planning (ERP) systems
Pang, L. | 2001
47
Features - Manager's Guide to Enterprise Resource Planning (ERP) Systems - Over the last decade, many organizations have experienced significant changes in their core business applications. To address these many changes, a new type of software system was developed -- Enterprise resource planning (ERP) systems.
Pang, Les | 2001
48
Privacy: An Opportunity for IS Auditors?
Cilli, Claudio | 2006
48
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted
| 2000
49
How To Eliminate the Ten Most Critical Internet Security Threats
| 2000
49
Using Audit Software and the Death Master File to Catch Crooks
Wessmiller, Ray | 2003
49
Identity Management Framework: Delivering Value for Business
Vanamali, Srinivasan | 2004
49
Secure Software Development -- The Role of IT Audit
Aras, Oezlem / Ciaramitaro, Barbara L. / Livermore, Jeffrey | 2008
49
CobiT Security Baseline Applied to Business Web Applications: A Practical Approach for All Sizes of Organisations
Watson, C. | 2009
49
The Buyer's Guide - This biannual guide provides readers with an up-to-date breakdown of the current products and companies of interest to the IS audit, control and security community.
| 2002
49
Features - How To Eliminate the Ten Most Critical Internet Security Threats - This article, from the SANS Institute, details the most exploited Internet security flaws and the actions needed to rid systems of these vulnerabilities
| 2000
50
Plus - CPE Quiz #71
Oringel, Joey | 2000
51
Enhancing Security with an IT Network Awareness Center
Driml, Scott | 2003
51
Compliance Assessment of IP Networks: A Necessity Today
Talpade, Rajesh / Singh, Jatinder | 2007
52
The Auditors Role in Reviewing Business Continuity Planning
Muthukrishnan, Ravi | 2006
53
Risk and Governance Issues for ERP Enterprise Applications While ERP applications can resolve a number of control issues associated with a fragmented legacy systems environment, not surprisingly, they can introduce new risks of their own
Addison, S. | 2001
53
Biometrics: An Overview of the Technology, Challenges and Control Considerations
Down, Michael P. / Sands, Richard J. | 2004
53
Justifying Investment in Security
Parmar, Kamal | 2003
53
Features - Risk and Governance Issues for ERP Enterprise Applications - While ERP applications can resolve a number of control issues associated with a fragmented legacy systems environment, not surprisingly, they can introduce new risks of their own.
Addison, Stephen | 2001
54
Inseguridad Informática y Computación Anti-forense: Dos Conceptos Emergentes en Seguridad de la Información
Cano, Jeimy J. | 2007
54
Evaluating the Potential Technology Impact of IFRS
Bastos, R. | 2009
54
Inseguridad Informatica y Computacion Anti-forense: Dos Conceptos Emergentes en Seguridad de la Informacion
Cano, J. J. | 2007
54
IT Governance Roundtable: Boston, November 2007
| 2008
55
Features - Banks and the Possibilities of E-commerce - As many banks in the world have begun using the Internet in business, often e-commerce is confused with Internet banking. Internet banking should be interpreted as a part of the strategy of e-commerce.
González, Marcelo Hector | 2001
55
Banks and the Possibilities of E-commerce As many banks in the world have begun using the Internet in business, often e-commerce is confused with Internet banking. Internet banking should be interpreted as a part of the strategy of e-commerce
Gonzalez, M. H. | 2001
56
Using COBIT and the Balanced Scorecard as Instruments for Service Level Management
Grembergen, Wim Van / Haes, Steven De / Amelinckx, Isabelle | 2003
57
HelpSource Q&A
Subramaniam, Gan | 2008
57
Help Source - Help Source Q&A
Subramaniam, B.Ganapathi | 2004
59
CPE Quiz #119 - Based on Volume 2, 2008
Chan, Sally | 2008
59
CPE Quiz #94, based on volume 1, 2004
Oringel, Joe | 2004
59
CPE Quiz #101 - Based on Volume 2, 2005
Khan, Kamal | 2005
59
CPE Quiz #113 - Based on Volume 2, 2007
Khan, Kamal | 2007
60
Plus - CE Quiz #77, Based on Volume 2, 2001
Oringel, Joey | 2001
63
CPE Quiz #87, based on volume 6, 2002
Oringel, Joe | 2003
65
Plus - CE Quiz #83, Based on Volume 2, 2002
Oringel, Joey | 2002
ISACA Bookstore Price List Supplement
| 2003
Plus - ISACA Bookstore Price List - Supplement
| 2000
Plus - ISACA Bookstore Offerings - Supplement
| 2000
Feedback