Page 1 from 1,656 hits

Sort by: Relevancy | Currentness | Title

  1.  

    Key Considerations for Business Resiliency

    Pironti, J.P. | British Library Online Contents | 2009
  2.  

    Justifying IT Projects: Connecting the Dots From Systems to Business Value

    Dutta, A. | British Library Online Contents | 2009
  3.  

    IS Security Matters: Reliable Security, Revisited

    Ross, S. | British Library Online Contents | 2009
  4.  

    The OCTAVE® Approach to Information Security Risk Assessment

    Panda, P. | British Library Online Contents | 2009
  5.  

    Understanding How to Protect Web-facing Applications: Under the Covers of Requirement 6.6 of PCI

    Nair, S. / Drew, D. / Verderber, P. | British Library Online Contents | 2009
  6.  

    Getting Buy-in-An Easier Way

    Konrad, C. | British Library Online Contents | 2009
  7.  

    Usefulness of an Information Security Management Maturity Model

    Canal, V.A. | British Library Online Contents | 2008
  8.  

    Keys to Data Governance Success: Teamwork and an Iterative Approach

    Moseley, M. | British Library Online Contents | 2008
  9.  

    Book Review: Fraud Casebook: Lessons From the Bad Side of Business

    Kanhere, V. | British Library Online Contents | 2008
  10.  

    The Top 10 Compliance Project Challenges and Opportunities

    Chandola, T. | British Library Online Contents | 2008
  11.  

    Database Security, Compliance and Audit

    Le Grand, C. / Sarel, D. | British Library Online Contents | 2008
  12.  

    Book Review: The Handbook of Fraud Deterrence

    Kanhere, V. | British Library Online Contents | 2008
  13.  

    IT Governance: IS Auditing and Information Privacy Governance: A Natural Fit

    Zoladz, C. | British Library Online Contents | 2008
  14.  

    Five Questions With

    Gill, T. | British Library Online Contents | 2008
  15.  

    Insider Threat-The Fraud That Puts Companies at Risk

    Taylor, P. | British Library Online Contents | 2008

Number of results: 10 | 20 | 50