Seite 1 von 1.656 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

  1.  

    Computer Aided Fraud Prevention and Detection-A Step-by-step Guide

    Kanhere, V. | British Library Online Contents | 2010
  2.  

    Using Spreadsheets and Benford's Law to Test Accounting Data

    Simkin, M.G. | British Library Online Contents | 2010
  3.  

    The Business Value of IT

    de la Fuente, R.J. | British Library Online Contents | 2010
  4.  

    Driving New Value From IT Risk Management

    Westerman, G. / Barnier, B. | British Library Online Contents | 2010
  5.  

    Availability Risk Assessment-A Quantitative Approach

    Hariharan | British Library Online Contents | 2010
  6.  

    Performing a Security Risk Assessment

    Schmittling, R. / Munns, A. | British Library Online Contents | 2010
  7.  

    Developing an Information Security and Risk Management Strategy

    Pironti, J.P. | British Library Online Contents | 2010
  8.  

    IT Value: Five Critical Success Factors for Introducing Val IT

    Harries, S. / Harrison, P. | British Library Online Contents | 2009
  9.  

    Achieving Continuous IT Auditing: RICA

    Johnstone, D. / Wong, E.C.Y. | British Library Online Contents | 2009
  10.  

    Revised ISACA Model Curriculum for IS Audit and Control

    Summers, S. | British Library Online Contents | 2009
  11.  

    The Future of Key Management

    Martin, L. / Noll, L. / Randall, J. | British Library Online Contents | 2009
  12.  

    IT Value: The Challenges of Implementing Portfolio Management

    Harries, S. / Harrison, P. | British Library Online Contents | 2009
  13.  

    IT Audit Basics: What Every IT Auditor Should Know About Sampling

    Singleton, T.W. | British Library Online Contents | 2009
  14.  

    IT Governance and Process Maturity

    Debreceny, R. / Gray, G.L. | British Library Online Contents | 2009
  15.  

    The Hidden Values of IT Risk Management

    Abram, T. | British Library Online Contents | 2009
  16.  

    IS Security Matters: People Impacting Events

    Ross, S.J. | British Library Online Contents | 2009
  17.  

    Guest Editorial: Managing IT Governance Through Market Turbulence

    Zarrella, E. | British Library Online Contents | 2009
  18.  

    IT Governance: The Role of the IT Auditor in IT Governance

    Hardy, G. | British Library Online Contents | 2009
  19.  

    Compliance for Compliance's Sake?

    Sollis, D. | British Library Online Contents | 2010
  20.  

    Did We Hear the Warning Shot?

    Suan, B.H. | British Library Online Contents | 2010
  21.  

    IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part I)

    Singleton, T.W. | British Library Online Contents | 2010
  22.  

    Fraud Analysis Technique Using ACL

    Vazzari, D. | British Library Online Contents | 2010
  23.  

    IS Security Matters: IS Security Matters?

    Ross, S.J. | British Library Online Contents | 2010
  24.  

    Risk Landscape of Cloud Computing

    Raval, V. | British Library Online Contents | 2010
  25.  

    Emerging Topics and Technologies in Information Systems

    Kanhere, V. | British Library Online Contents | 2010
  26.  

    Computer Forensics Technologies for Personally Identifiable Information Detection and Audits

    Pan, Y. / Stackpole, B. / Troell, L. | British Library Online Contents | 2010
  27.  

    Security Monitoring

    Gumus, T. | British Library Online Contents | 2010
  28.  

    Looking at IT Risk Differently

    Rameshkumar, A.V. | British Library Online Contents | 2010
  29.  

    Criteria and Methodology for GRC Platform Selection

    Singh, A. / Lilja, D.J. | British Library Online Contents | 2010
  30.  

    Top 10 Security and Privacy Topics for IT Auditors

    Rai, S. / Chukwuma, P. | British Library Online Contents | 2010
  31.  

    Excerpt: ITGI Enables ISO/IEC 38500:2008 Adoption

    Hardy, G. | British Library Online Contents | 2009
  32.  

    IT Audit Basics: What Every IT Auditor Should Know About Controls: The CDLC

    Singletn, T.W. | British Library Online Contents | 2009
  33.  

    Value of IT: Beyond the Theoretical

    UcedaVelez, T. | British Library Online Contents | 2009
  34.  

    IT Audit Basics: What Every IT Auditor Should Know About IT Audits and Data

    Singleton, T.W. | British Library Online Contents | 2009
  35.  

    Cloud Computing: An Auditor's Perspective

    Gadia, S. | British Library Online Contents | 2009
  36.  

    Security, Audit and Control Features SAP® ERP, 3^r^d Edition

    Kammermeier, P. | British Library Online Contents | 2009
  37.  

    IT Audit Basics: IT and Privacy Audits

    Singleton, T.W. | British Library Online Contents | 2009
  38.  

    Evaluating the Potential Technology Impact of IFRS

    Bastos, R. | British Library Online Contents | 2009
  39.  

    Preserving Electronically Encoded Evidence

    Davis, R.E. | British Library Online Contents | 2009
  40.  

    Security Issues in a Continuous Reporting Environment

    Gal, G. | British Library Online Contents | 2009

Ergebnisse anzeigen: 10 | 20 | 50