Viruses and UNIX - What Computer Viruses Are - And Are Not (Unknown)
- New search for: Conorich, D. G.
- New search for: Conorich, D. G.
In:
EDP AUDITOR JOURNAL
;
4
;
50
;
1993
-
ISSN:
- Article (Journal) / Print
-
Title:Viruses and UNIX - What Computer Viruses Are - And Are Not
-
Contributors:Conorich, D. G. ( author )
-
Published in:EDP AUDITOR JOURNAL ; 4 ; 50
-
Publisher:
- New search for: SOCIETY OF NATIONAL ASSOCIATION PUBLICATIONS
-
Publication date:1993-01-01
-
Size:50 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 657.45
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.45 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Issues & CommentsCangemi, Michael P. et al. | 1995
- 5
-
EDITORIAL: Issues & CommentsCangemi, Michael P. et al. | 1994
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses IS corporate governance as the infant segment of an emerging standard among IT control community constituencies| 1999
- 6
-
How to Keep IT Under Control in Today's Business and Technology EnvironmentGuldentops, Erik et al. | 1996
- 7
-
The use of CobiT as a framework and CobiT AdvisorClifford, Alan P. et al. | 1998
- 7
-
Making Effective Oral PresentationsGolen, S. / Scott, H. et al. | 1992
- 8
-
GUEST EDITORIAL: EDP Auditing: The Heights Still Have Not Been ReachedParker, Robert G. et al. | 1994
- 8
-
Security in the Data Warehouse-Internet EnvironmentInmon, William H. et al. | 1997
- 9
-
Use Application Program Change Control to Reduce Your RisksDykes Jr, Wyndell C. et al. | 1995
- 9
-
IS Security Matters - Who is Melissa Chernobyl and Why is She Doing These Terrible Things? - Lessons learned and questions still unanswered are presented as well as ways to avoid infestationRoss, Steven J. et al. | 1999
- 9
-
How IS Internal Controls Contribute to Total Quality ManagementCapuder, Lawrence F. et al. | 1998
- 10
-
HelpSource Q& ALilly, Fred et al. | 1996
- 12
-
Control Objectives for Information and related Technology COBITMakosz, Paul et al. | 1996
- 12
-
Implications of the Information AgeWalz, A. et al. | 1993
- 13
-
Case Study - VASCO Data Security Enables Secure Communications Over the Internet - How to balance responsibility to secure data against consumer desire for easy access is the focus of this articleHoornaert, Frank et al. | 1999
- 13
-
PERSPECTIVES: Information Systems Audit EducationKneer, Dan et al. | 1994
- 14
-
Internet and EDI in Effective AccountingBoef, Anthonie den et al. | 1997
- 14
-
The Law of Computer Technology: Rights - Licenses - Liabilities (2nd Edition)Fordham, Thomas et al. | 1996
- 15
-
Using Oracle Tools to Audit Oracle Logical SecurityCrider, Wilson et al. | 1998
- 17
-
Standards, Statements and Guidelines - Compliance to maintain ISACA member status and compliance for the CISA designation are outlined and the status of ISACA issuances is noted| 1999
- 17
-
The Internet: Exploring Advertising Opportunities Using the InternetKogan, Alexander et al. | 1996
- 17
-
Utilizing CAATs to Determine Input ErrorsGillevet, Joe et al. | 1995
- 19
-
Flashback to the years 1980 to 1985Perry, William E. et al. | 1997
- 20
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 1999
- 20
-
LANs Are Not As Secure As You ThinkGlassman, H. N. et al. | 1993
- 23
-
Taking the Lead in the Management of Information SystemsSarup, Deepak et al. | 1997
- 23
-
CASE HISTORY: Auditing the Purchase of End-User ComputingBlackburn, Sarah et al. | 1994
- 24
-
Security Considerations for E-MailMartell, S. et al. | 1993
- 24
-
Point of Failure Recovery PlanBlatnik, Gregory J. et al. | 1998
- 25
-
Perspective - What is so Special about Y2K Projects? - The author purports that there has been constant bandying of the Y2K phenomenon, yet makes his case that it should be handled as any other audit project. He also discusses one key difference: An inflexible implementation dateOliver, Derek J. et al. | 1999
- 26
-
A Comparison of Internal Control: COBIT, SAC, COSO and SASColbert, Janet L. et al. | 1996
- 26
-
Windows NT 3.5: Guidelines for Security, Audit and ControlKazin, Joel S. et al. | 1995
- 27
-
Separating IT Resources Using CobiT as a GuidelineTaylor, Don et al. | 1997
- 28
-
Managing Data Quality in Client-Server EnvironmentsBowen, Paul L. et al. | 1995
- 28
-
Control and Audit Guidelines for the Millennium Conversion: An Application of the CobiT ModelGrembergen, Wim Van et al. | 1998
- 30
-
BOOKS, TAPES, AND NEW PRODUCTS| 1994
- 31
-
Techniques for Auditing Novell's NetWareCrowell, D. A. et al. | 1992
- 31
-
Book Reviews - Two books, Corporate Information Management Systems Windows 95 in a NutshellApplegate, Lynda M. et al. | 1999
- 34
-
The Evolution of the Internet in PeruJáuregui, Kety Lourdes et al. | 1998
- 34
-
Features - Middleware Security: CORBA or DCOM? - How security and control are implemented in two competing information systems architectures is the focus of this articleGarceau, Linda R. et al. | 1999
- 35
-
Protecting Excel WorksheetsMcFadden, Patrick J. et al. | 1997
- 36
-
CPE QUIZ| 1994
- 36
-
The Law of Electronic Commerce: EDI, Fax, and E-Mail| 1993
- 36
-
Controlling EDI Environments Consistent with COBIT and COSOJoseph, Gilbert W. et al. | 1996
- 36
-
Targeting Potential Audit Risk Areas on Radar GraphsHunton, James E. et al. | 1995
- 38
-
FEATURE ARTICLES: The Evolution of EDP Auditing in North America: 1977 to 1994Singleton, Tommie et al. | 1994
- 42
-
Windows NT Security and AuditingGauntt, Ann et al. | 1995
- 42
-
Eggs in a Basket: Distributing the Risks of Electronic SignaturesWright, Benjamin et al. | 1996
- 44
-
Features - Is Auditing: The State of the Profession Going Into the 21st Century - The author provides insights based on a survey and offers additional perspectiveLucy, Richard F. et al. | 1999
- 44
-
Microcomputer Security - Is Your Organization at Risk?West, O. D. / Zoladz, C. et al. | 1993
- 47
-
A Top-Down Approach to Auditing the Management of the Information Systems FunctionCapuder, L. F. / Thomas, T. C. et al. | 1992
- 48
-
Security in Client-Server: Authentication IssuesCairo, Lori et al. | 1995
- 50
-
Viruses and UNIX - What Computer Viruses Are - And Are NotConorich, D. G. et al. | 1993
- 50
-
CPE Quiz #49| 1996
- 51
-
Developments in EDP Audit Education, Research and Literature in North America: 1977 to 1994Singleton, Tommie et al. | 1994
- 52
-
Features - The Year 2000 and the Small Business El Año 2000 y Los Pequeños Negocios - This article, presented in both English and Spanish, is a Journal debut and reflects a commitment to run articles in languages other than EnglishRodriguez, German et al. | 1999
- 55
-
The Israeli "Internal Auditing Act, 1992"Sebban, Y. E. et al. | 1992
- 55
-
CPE Quiz #43| 1995
- 56
-
An Analysis of Software Management Controls for Client-Server ArchitecturesButler, C. W. / Richardson, G. L. et al. | 1993
- 56
-
CPE Quiz #55| 1997
- 58
-
Features - How to Keep a Private Branch Exchange Safe PBX switches are a favorite target of unscrupulous people. This article presents what can be done to prevent PBX fraud or disruptionHarvel, Murray et al. | 1999
- 58
-
Bookstore Listing| 1997
- 61
-
Surrogate and Corresponding File VirusesMagruder, S. / Lewis, S. X. et al. | 1992
- 62
-
Career Opportunities| 1997
- 62
-
Looking Ahead: The Future of the IS Audit and Control ProfessionOWen, Laura et al. | 1994
- 63
-
Plus - CPE Quiz #65Oringel, Joey et al. | 1999
- 64
-
ResearchErickson, John et al. | 1996
- 65
-
Features - New Assurance Service Opportunities for Information Systems Auditors - COBIT 2nd Edition is cited as an important tool for the design and delivery of risk assessment assurance and other critical assurance servicesHunton, James et al. | 1999
- 69
-
How Do Expert and Novice Information Systems Auditors Differ in Domain Knowledge?Wu, R. C. et al. | 1992
- 69
-
Index of Journal Articles in 1994| 1994
- 69
-
ISACA Bookstore Offerings| 1999
- 72
-
The Possible Impact of the COSO Report on an Entity's Internal Audit FunctionRezaee, Z. et al. | 1993
- 73
-
ISACA Bookstore Price List| 1999
-
Focus on 1999 - Millennium Watch, edited for the International Federation of Accountants by Past International President, Deepak Sarup, will return in a subsequent issue| 1999