-
An E-citadel for Securing Credit Card and Consumer Data: A New Application for an Old Approach to Security
British Library Online Contents | 2002| -
An Exploration of Global Perceptions of Security and Privacy
British Library Online Contents | 2002| -
Applying IT Governance at Home: Oversight of a Computer Acquisition
British Library Online Contents | 2002| -
Asking the Right Questions for IT Governance Erik Guldentops, CISA, presents a view of the importance of and need for corporate governance regulations and standards for overall enterprise governance. He notes that while it is not the most efficient IT governance process, asking the tough questions is an effective way to get started. To this effect, he provides a list of questions to help an organization begin
British Library Online Contents | 2001 -
A Survey of Application Security in Current International Standards
British Library Online Contents | 2002| -
Auditing and Business Controls: Coming of Age in the Healthcare Industry
British Library Online Contents | 2000| -
Auditing and Security: AS/400, NT, UNIX, Networks and Disaster Recovery Plans
British Library Online Contents | 2002| -
Automated User Authentication: The Final Frontier of Information Security
British Library Online Contents | 2001| -
Benefits of Year 2000 Work This feature-length article is a compilation of some of the lessons learned that were results of the extensive planning and alterations that occurred in preparation for Y2K. The comments were gleaned from the contingency planning listserv
British Library Online Contents | 2000 -
Black Box Logging and Tertiary Monitoring of Continuous Assurance Systems
British Library Online Contents | 2003| -
Choosing the Best Solution for Your Network Security: Secure Shell, TLS or IPSec The increase in computer security breaches has fostered the publics awareness of the critical need for data security to continue the successful growth of a business. The author discusses possible solutions, including Secure Shell, Transport Layer Security and Internet Protocol Security
British Library Online Contents | 2001| -
Claves Para El Gobierno de los Systemas de Informacion, comentarios Las notas a este libro presentan como los autores integran informacion sobre controles, planificacion de contingencias, mejora de procesos, tratamiento de recursos humanos, restricciones legales en las organizaciones y el marco de referencia COBIT⊙
British Library Online Contents | 2001| -
COBIT 3^r^d Edition Usage Survey: Growing Acceptance of COBIT
British Library Online Contents | 2002| -
Combating Cyberthreats-Partnership Between Public and Private Entities
British Library Online Contents | 2002| -
Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program
British Library Online Contents | 2002| -
Computer Forensics-From Cottage Industry to Standard Practice
British Library Online Contents | 2001| -
Continuous Auditing and Reporting-The Fourth World Symposium
British Library Online Contents | 2002| -
Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment Tool
British Library Online Contents | 2002| -
CPO Position Joins Executive Ranks As increased importance is placed on privacy and the ethical issues surrounding privacy, many companies have created a new executive-level position called chief privacy officer (CPO). The author discusses the role of the CPO in todays corporate environment
British Library Online Contents | 2001| -
Creating the Privacy Complaint Organization The concept of personal information privacy, and the rights of citizens to protect themselves has caused governments to begin to consider enacting personal information privacy legislation. This article addresses the process under which a company can become privacy complaint, adhering to the specific requirements of the legislation under which it operates
British Library Online Contents | 2001| -
Cross-Border Privacy Impact Assessments: An Introduction Organizations doing business in multiple jurisdictions are subject to regulatory and cultural variances on what data are protected, how the data must be protected, and what rights are afforded to the enterprise, the regulators and the individual. The author introduces a cross-border privacy impact assessment model
British Library Online Contents | 2001| -
Cybersecurity and the Future of E-commerce: The Role of the Audit Community
British Library Online Contents | 2001|
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.