How to Use a New Computer Audit Fraud Prevention and Detection Tool (English)

INFORMATION SYSTEMS CONTROL JOURNAL

Document information

  • Title:
    How to Use a New Computer Audit Fraud Prevention and Detection Tool
  • Author / Creator:
  • Journal / Series:
  • Volume:
    1
  • Page:
    63-66
  • Publisher:
    INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
  • Year of publication:
    2004
  • Size:
    4 pages
  • ISSN:
  • Type of media:
    Article (Journal)
  • Type of material:
    Print
  • Language:
    English
  • Classification:
    DDC:    657.4550285

Table of contents – Volume 1

Show all volumes and issues

Tables of content are generated automatically and are based on records of articles contained that are available in the TIB-Portal index. Due to missing records of articles, the volume display may be incomplete, even though the whole journal is available at TIB.

4
IS Security Matters: Cloudy Daze
Ross, S.J. | 2010
5
The Reality We Can All Agree On
Bostick, J. | 2009
5
Editorial - Issues & Comments
Cangemi, Michael | 2006
5
Guest Editorial: Dysfunctional IT -- A Business Issue
Nicholson, Howard | 2008
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA addresses one of the greatest threats to a business or company: Misuse of e-mail. Among other topics, he also addresses corporate governance and accounting for earnings in the United States
Cangemi, Michael P. | 2000
5
Issues&Comments
Cangemi, M. | 2003
5
Editorial - Issues & Comments - Editor in Chief Michael P. Cangemi, CISA, CPA, discusses the role of the board in information security, IT governance and the foundation's 25th anniversary, then proudly declares himself an IT optimist.
Cangemi, Michael P. | 2001
5
The new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United States
Cangemi, M. | 2002
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses the new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United States.
Cangemi, Michael | 2002
5
Dysfunctional IT-A Business Issue
Nicholson, H. | 2008
5
Editodal - Issues & Comments
Cangemi, Michael | 2005
6
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part I)
Singleton, T.W. | 2010
7
IS Security Matters: Dumb Luck, Smart Risk
Ross, Steven | 2008
8
IS Security Matters: Contents and Context
Ross, Steven J. | 2006
8
IS Security Matters: Professor Watts Explains It All
Ross, Steven J. | 2007
8
IS Security Matters: Is Information Security a Threat to Resilience?
Ross, Steven J. | 2005
9
COBIT® Management Guidelines
Elysee, M. | 2001
9
Lessons from Tragedy, Revisited
Ross, S. | 2003
9
Intrusion Signatures and Analysis
Jelleyman, A. | 2002
9
"Fishy Stories" Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes
| 2000
9
IS Security Matters - "Fishy Stories" - Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes, such as violation of software licenses in relation to an auditor's need to use statistics to budget for security
Ross, Steve | 2000
9
IT Audit Basics: The COSO Model: How IT Audtiors Can Use IT to Measure the Effectiveness on Internal Controls (Part 2)
Singleton, Tommie W. | 2008
9
IS Security Matters: Four Little Words
Ross, S.J. | 2009
9
Maybe We Have Won
Ross, S. J. | 2004
9
IS Security Matters - Maybe We Have Won
Ross, Steven J. | 2004
9
IS Security Matters - Lessons from Tragedy, Revisited
Ross, Steven | 2003
20
Five Questions With...
Roach, Andy | 2008
11
IT Audit Basics: COBIT -- A Key to Success as an IT Auditor
Singleton, Tommie W. | 2006
11
IT Audit Basics: Auditing Business Continuity
Sayana, S.Anantha | 2005
11
Is Security Matters - Lessons from Tragedy - Steven J. Ross, CISA, provides his perspective of the recent terrorist attacks and examines the valuable lessons that businesses can learn from the events as they, the US and the world recover and prepare for the future.
Ross, Steven J. | 2002
11
The Definitive Handbook of Business Continuity Management, by Andrew Hiles and Peter Barnes
Sarathy, E. | 2001
11
IT Audit Basics - Strategy Issues: Sarbanes-Oxley Is Only Part of the Solution
Gallegos, Frederick | 2004
11
ISACA® Member and CISA® Compliance
| 2003
11
Strategy Issues: Sarbanes-Oxley Is Only Part of the Solution
Gallegos, F. | 2004
11
IT Value: Value Management Principles
Guldentops, Erik | 2007
11
Lessons from Tragedy
Ross, S. J. | 2002
11
Standards, Statements, Guidelines - ISACA(R) Member and CISA(R) Compliance
| 2003
12
The Definitive Handbook of Business Continuity Management, 2^n^d Edition
Rafeq, A. | 2010
13
e-Commerce Security-Network Perimeter Security By Deloitte & Touche
Mansour, C. | 2003
13
Standards and guidelines for maintaining compliance for both ISACA™ membership and the CISA designation are outlined and the status of ISACA issuances noted
| 2002
13
IT Audit Basics: What Every IT Auditor Should Know About Sampling
Singleton, T.W. | 2009
13
IS Security Matters - Why Passwords Persist - Steven J Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures.
Ross, Steven J. | 2001
13
Emerging Topics and Technologies in Information Systems
Kanhere, V. | 2010
13
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISAx designation are outlined and the status of ISACA issuances noted.
| 2002
13
IT Governance: Dysfunctional Operations in IT
Anderson, Kent | 2008
13
Activity-Based Information Systems
Nair, M. | 2000
13
Why Passwords Persist Steven J. Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures
| 2001
13
Book Reviews - e-Commerce Security -- Network Perimeter Security
Deloitte / Touche / Mansour, Charles | 2003
14
IT Governance: Security Folklore, Facts and the Future
Southgate, Roger | 2005
14
The Many Faces of IT Governance: Crafting an IT Governance Architecture
Robinson, Nick | 2007
14
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance
| 2006
14
The Business Value of IT
de la Fuente, R.J. | 2010
14
ISACA® Member and Certification Holder Compliance
| 2004
15
IT Governance - Spotlight on Governance
Hamaker, Stacey | 2003
15
More Than a Specialized Concern:Survey of Public Sector Board Members Has Implications for IT Governance
Capozzi, M. / Singleton, J. | 2002
15
Stepping Through the IS Audit
Bayuk, J. | 2000
15
IT Governance - More Than a Specialized Concern:Survey of public Sector Board Members Has Implications for IT Governance - Maria Capozzi, MPA, BA, and Jon Singleton, CISA, CA, explore a recent study that examines the board governance practices of various public sector boards within the government reporting entity, completed by Canada's Provincial Auditor's Office, and how the results can be considered in the context of IT governance.
Capozzi, Maria / Singleton, Jon | 2002
15
Did We Hear the Warning Shot?
Suan, B.H. | 2010
15
Spotlight on Governance
Hamaker, S. | 2003
16
Case Study: IT Security Governance -- A Slow Start to a High maturity Level
Bitterli, Peter R. | 2005
17
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances noted.
| 2001
17
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act
Alles, M. / Kogan, A. / Vasarhelyi, M. | 2004
17
Global Perspectives: IT Governance
Fonseca, Dante Ferrini / Mustafa, Erol | 2006
17
Commentary - The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act
Alles, Michael / Kogan, Alexander / Vasarhelyi, Miklos | 2004
17
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted
| 2000
17
IT Governance: The Role of the IT Auditor in IT Governance
Hardy, G. | 2009
17
Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted
| 2000
18
Businesses Today Are Undergoing a Chemical Change
Lainhart, J. W. | 2001
18
IT Value: IT Project Cancellations: Pay Now or Pay Later
Thorp, John | 2008
18
Performing a Security Risk Assessment
Schmittling, R. / Munns, A. | 2010
18
IT Governance - Businesses Today Are Undergoing a Chemical Change - John W Lainhart IV, CISA, reports on the changes impacting businesses today in the wake of the e-commerce revolution and points out the need for IT governance to keep control over the enterprise's investment.
Lainhart IV, John W. | 2001
19
Plus - Technical Q & A, Helpsource
Lilly, Fred L. | 2000
20
Virtual Private Networking-New Issues for Network Security
Shue, L. | 2001
20
Features - Virtual Private Networking -- New issues for Network Security - Enterprises today recognize the need for global outreach to ensure success. Providing network connectivity through VPNs answers the need for worldwide access, but raises new security issues as well. A preview of the upcoming information Systems Audit and Control Foundation research publication.
Shue, Lily | 2001
20
Book Review: COBIT 4.0 - IT Governance Institute
Singh-Latulipe, Rob | 2006
20
Val IT: From the Vantage Point of the COBIT 4.0 Pentagon Model for IT Governance
Singh-Latulipe, Rob | 2007
20
Book Review: Oracle Security Privacy Auditing
Nanda, Arup / Burleson, Don | 2005
20
The IS Audit Process
Sayana, S. A. | 2002
20
CobiT 4.0 By IT Governance Institute
Singh-Latulipe, R. | 2006
20
IT Audit Basics - The IS Audit Process - S. Anantha Sayana, CISA, CIA, writing the first of the Journal's new column, focuses on the audit process -- What it is and what it involves.
Sayana, S.Anantha | 2002
21
Using CAATs to Support IS Audit
Sayana, S. A. | 2003
21
Standards, Statements and Guidelines - ISACA(R) Member and Certification Holder Compliance
| 2005
21
Outsourcing Information Security By C. Warren Axelrod
Emani, S. | 2006
21
Book Review: Outsourcing Information Security
Axelrod, C.Warren / Emani, Sarathy | 2006
21
IT Audit Basics - Using CAATs to Support IS Audit
Sayana, S.Anantha | 2003
22
Essentials of Knowledge Management By Bryan Bergeron
Kanhere, V. | 2006
22
IT Value: The Challenges of Implementing Portfolio Management
Harries, S. / Harrison, P. | 2009
22
Book Review: Auditor's Guide to Information Systems Auditing
Rafeq, A. | 2008
22
Book Review: Essentials of Knowledge Management
Bergeron, Bryan / Kanhere, Vishnu | 2006
23
Watchdog or Bloodhound? The Push and Pull Toward a New Audit Model
Sarup, D. | 2004
23
IT Governance: Why Information Security Governance Is Critical to Wider Corporate Governance Demands -- A European Perspective
Poole, Vernon | 2006
23
Commentary - Watchdog or Bloodhound? The Push and Pull Toward a New Audit Model
Sarup, Deepak | 2004
23
Key Elements of an Information Security Program
Pironti, John P. | 2005
23
The Y2K Bug-A Vaccine Against Terror Attacks?
Paliotta, A. R. | 2002
23
Helping Businesses Safeguard Information and Networks
Hale, R. | 2001
23
Features - Helping Businesses Safeguard Information and Networks - Companies face increasing financial risk due to online fraud and other threats to their e-business systems. Managed intrusion detection and authentication services are being launched as a way to render networks and data more secure.
Hale, Ron | 2001
23
Perspective - The Y2K Bug -- A Vaccine Against Terror Attacks? - The author examines the significance and value of Y2K preparations in light of recent terror attacks.
Paliotta, Allan R. | 2002
23
Features - New Book Addresses Online Signature Authentication - Excerpts from a new ISACF book Digital Signatures- Security and Controls that complement additional articles on e-mail security are presented here
| 2000
23
New Book Addresses Online Signature Authentication
| 2000
24
Business Risks and Security Assessment for Mobile Devices
Milligan, Patricia Mayer / Hutcheson, Donna | 2008
24
IT Audit Basics: Systems Development Life Cycle and IT Audits
Singleton, Tommie W. | 2007
24
Commentaries - Security Architecture: One Practitioner's View
Scammell, Tim | 2003
24
Security Architecture: One Practitioner's View
Scammell, T. | 2003
25
Features - Analysis Software for Auditors and Management - The author makes a case for auditors including data mining software such as WizRule in their regular audit "survival kits."
Denker, Bob | 2001
25
Analysis Software for Auditors and Management
Denker, B. | 2001
26
Risk Landscape of Cloud Computing
Raval, V. | 2010
27
Are E-mails Boon or Bane for Organisations?
Pathak, J. P. | 2000
27
Commentary: Preparing for the CISA or CISM Examination: A Brief, Hands-on Supplement for Candidates
Oliver, Derek J. / Shanahan, Max | 2006
27
Preparing for the CISA or CISM Examination: A Brief, Hands-on Supplement for Candidates
Oliver, D. J. / Shanahan, M. | 2006
27
IT Governance and Its Mechanisms
De Haes, S. / Van Grembergen, W. | 2004
27
IT Governance - IT Governance and Its Mechanisms
Haes, Steven De / Grembergen, Wim Van | 2004
27
Features - Are E-mails Boon or Bane for Organisations? - This timely article investigates corporate liabilities such as documents that leave an organization without management approval and offers safeguards
Pathak, J.P. | 2000
28
Features - Business Continuity: A Business Survival Strategy - Business continuity plans (BCP) are no longer a luxury, but an essential element of an organisation's risk management programme. The emphasis for business continuity today is on the organisation's critical business processes that need to be recovered in the event of a disaster for the survival of the organisation.
Doughty, Ken | 2002
28
Business Continuity: A Business Survival Strategy
Doughty, K. | 2002
28
Risk and Control Self-Assessment (RCSA): A Useful Complement to Information Systems Audits at Stanford University
Chakravarty, R. / Topper, F. | 2001
28
Using COBIT as a Tool to Lead Enterprise IT Organizations
Lambeth, John | 2007
28
Features - Risk and Control Self-Assessment (RCSA): A Useful Complement to Information Systems Audits at Stanford University - The Stanford University Internal Audit Department uses risk and control self-assessment to complement its audit services. The authors describe the purpose of RCSA, how the sessions are conducted, in what contexts and the useful information they glean from them.
Chakravarty, Ranjira / Topper, Frank | 2001
29
Practicing Information Technology Auditing for Fraud
Johnstone, Dale / Chung Yee Wong, Ellis | 2008
30
Continuous Assurance: We Are Way Overdue
Kneer, D. C. | 2003
30
Commentaries - Continuous Assurance: We Are Way Overdue
Kneer, Dan C. | 2003
30
Why Companies Are Not Implementing Audit, Antifraud and Assurance Software...and How to Fix It
Brooks, D. / Lanza, R. | 2006
30
Common Criteria: An Overview
Mookhey, K.K. | 2005
30
Commentary: Why Companies Are Not Implementing Audit, Antifraud and Assurance Software...and How to Fix It
Brooks, Dean / Lanza, Rich | 2006
32
Secure E-Business
Mehta, R. | 2000
32
Guidance on Aligning COBIT, ITIL and ISO 17799
Hardy, Gary | 2006
32
Criteria and Methodology for GRC Platform Selection
Singh, A. / Lilja, D.J. | 2010
32
IT Governance: Interdependence of COBIT and ITIL
Fabian, Robert | 2007
32
Features - Secure E-Business - In this article the author describes the many risks and concerns for conducting electronic business and makes comparisons among the several methods to make business transactions more secure
Mehta, Raj | 2000
32
Getting Buy-in-An Easier Way
Konrad, C. | 2009
33
Implications for the Future of COBIT Systems in Higher Education: Putting Critical Research and Theory Into Practice
Council, Claude L. | 2007
33
Electronic Commerce System Sophistication and the Audit Process: Insights from Information Systems Auditors
Stein, D. M. / Arunachalam, V. / Rittenberg, L. E. | 2001
33
Features - Electronic Commerce System Sophistication and the Audit Process: Insights from Information Systems Auditors - The authors relate the results of a survey on the sophistication of implementation strategies and overall control concerns of electronic commerce systems, conducted among the members of the Chicago Chapter of the Information Systems Audit and Control Association.
Stein, Douglas M. / Arunachalam, Vairam / Rittenberg, Larry E. | 2001
33
Is Your Printer Betraying Your Business?
Farao, Esteban | 2008
34
ISO 17799: Then, Now and in the Future
Sweren, Scott H. | 2006
34
Case Study - ZFPAudit: A Computer-assisted Audit Tool for Evaluation of Microsoft Operating Systems
Bek, Jon | 2004
34
ZFPAudit: A Computer-assisted Audit Tool for Evaluation of Microsoft Operating Systems
Bek, J. | 2004
35
Continuous Audits: Taking the Plunge
Nehmer, Robert | 2003
35
The Unconquered Monitoring Frontier: Time for a Real-time Command Center
Unwala, Huzeifa / Dharmadhikari, Milind | 2008
35
Threat Assessment and Security Measures Justification for Advanced IT Networks
Cerullo, Michael J. / Cerullo, Virginia | 2005
35
Green Security
Jones, A. | 2009
37
Black Box Logging and Tertiary Monitoring of Continuous Assurance Systems
Alles, Michael / Kogan, Alexander / Vasarhelyi, Miklos | 2003
37
New Basel Accord: Operational Risk Management-Emerging Frontiers for the Profession
Bhatia, M. | 2002
37
Features - New Basel Accord: Operational Risk Management -- Emerging Frontiers for the Profession - The new Basel Accord is attempting to sensitize banks towards the risks they undertake in carrying out business. This article outlines the nature of operational risk management and explains how IS audit and control professionals can contribute to this emerging area.
Bhatia, Mohan | 2002
37
Case Study: A Cosmological Approach to IT Governance: Val IT and COBIT Lessons Learned at the United Nations
Bellone, Jason / Dell'Accio, Dino Cataldo / Rodriguez, Juan | 2007
37
Compliance Audit-A Process of Optimization, Not an Obligation
Mehta, A. | 2009
38
Managing the Insider Threat: Data Surveillance
Moynihan, John | 2008
38
Availability Risk Assessment-A Quantitative Approach
Hariharan | 2010
38
ITIL in a Complex World: Focusing on Success in a Multisourced Environment
Lonsdale, Derek / Clark, Wendy / Udvadia, Bina | 2006
39
Security Issues in a Continuous Reporting Environment
Gal, G. | 2009
39
Open Source Tools for Security and Control Assessment
Mookhey, K.K. | 2004
40
Features - OS-390...But Why? Background to the Reliability and Availability of OS-390 Mainframes - Why is OS-390 generally considered so reliable, well controlled and manageable, especially suited for business-critical applications? Why is it considered a serious candidate for UNIX applications and web servers? The author examines the internal structure and security of OS-390.
Mienes, Peter | 2001
40
Audit and Assurance of Information Systems and Business Processes: A Foundation for Providing Sound Governance Decision Making
Finne, Thomas | 2006
40
OS/390...But Why? Background to the Reliability and Availability of OS/390 Mainframes
Mienes, P. | 2001
40
Measuring the Readability of Software Requirement Specifications: An Empirical Study
Kanter, Howard A. / Muscarello, Thomas J. / Ralston, Christopher | 2008
41
Features - Intellectual Property and the Internet: Who Owns the Information? - One cannot think about e-mail and Internet security without keeping a watchful eye on the dynamic questions and answers regarding intellectual property. This article explores the current nuances
Parkes, Hugh | 2000
41
Intellectual Property and the Internet: Who Owns the Information?
Parkes, H. | 2000
42
Company Perspectives on Business Value of IT Investments in Sarbanes-Oxley Compliance
Velichety, Swapna / Park, Jeongil / Jung, Sungkun / Lee, Sooyoun / Tanriverdi, Hüseyin | 2007
42
Looking at IT Risk Differently
Rameshkumar, A.V. | 2010
42
Internet Financial Reporting
Poon, Pak-Lok / Li, David / Yu, Yuen Tak | 2003
43
The New Compliance Background
Mehdizadeh, Yahya | 2006
44
Database Activity Monitoring: An Emerging Technology for Audit and Compliance
Pinch, M. | 2009
44
Features - Insuring Information Security: Commercial Insurance as an Information Security Driver - This article examines how the insurance market addresses risks resulting from failures of information security practices and how the insurance industry's goal of seeking maximum profit while minimizing risk may drive the evolution of information security standards.
Pollitt, Mark M. | 2002
44
Insuring Information Security: Commercial Insurance as an Information Security Driver
Pollitt, M. M. | 2002
44
Compliance for Compliance's Sake?
Sollis, D. | 2010
45
Web Services Security
Bhatia, Mohan | 2005
45
Automating System Security Audits
Pinkett, Fred | 2004
46
IT Merger Due Diligence: A Blueprint
Bhatia, Mohan | 2007
46
Plus - CPE Quiz #68
Oringel, Joey | 2000
46
Insider Threat -- The Fraud That Puts Companies at Risk
Taylor, Patrick | 2008
47
Employee Monitoring and Surveillance -- The Growing Trend
Wakefield, Robin L. | 2004
47
Using Spreadsheets and Benford's Law to Test Accounting Data
Simkin, M.G. | 2010
47
Making CA Work in a Globally Critical Bank System
Hessler, Ralph / Ranade, Jan | 2003
48
Nuevas Tecnologias Desplegadas con Inteligencia, ¿Seran las Aliadas de los Profesionales de Auditoria de TI en las Grandes Corporaciones?
Soria, D.M. | 2008
48
Overview of Mobile Technology
Smith, Matt | 2006
48
Nuevas Tecnologías Desplegadas con Inteligencia, ?Serán las Aliadas de los Profesionales de Auditoría de TI en las Grandes Corporaciones?
Soria, Diego Martín | 2008
49
Cost-effective Implementation of Identity Management
Sarva, Srinivas | 2005
49
Features - Disaster Recovery and Business Continuity Planning: Testing an Organization's Plans - Putting the pieces together following a disaster is not just dependent on technology but involves people and communication and the recognition that any problems can be solved only through superior personal leadership skills combined with positive, strategic communication and in trouble-shooting tough, touchy, sensitive corporate communications issues.
Musaji, Yusufali F. | 2002
49
Auditing Employee Use of E-mail
Moody, Robert / Serepca, Beth | 2003
49
Disaster Recovery and Business Continuity Planning: Testing an Organization's Plans
Musaji, Y. F. | 2002
49
Risk Associated With Web Application Vulnerabilities
Fath, K. / Ott, J. | 2009
50
Road Map to XBRL Adoption as New Reporting Model
Srinivas, Sarva | 2004
50
Case Study: Continuous Auditing Comes of Age
Brennan, Gerard | 2008
51
The Dynamics of Privacy Risk
Axelrod, C.Warren | 2007
51
The Role of Attack Simulation in Automating Security Risk Management
Cohen, Gidi | 2005
52
Sarbanes-Oxley -- Considerations for a Framework for IT Financial Reporting Controls
Fox, Christopher | 2004
52
The New World of Risk-based Regulation (Part 2)
Micallef, Mario | 2008
53
The Future of Key Management
Martin, L. / Noll, L. / Randall, J. | 2009
53
Impact of SAS No. 94 on Computer Audit Techniques
Cerullo, M.Virginia / Cerullo, Michael J. | 2003
53
Driving New Value From IT Risk Management
Westerman, G. / Barnier, B. | 2010
55
Control Self-assessment for Information and Related Technology
Bakshi, Sunil | 2004
55
Help Source Q& A
Subramaniam, Gan | 2006
56
Plus - CE Quiz #80, Based on Volume 5, 2001
Oringel, Joey | 2002
57
Excerpt: IT Governance Roundtable
| 2008
58
Preserving Electronically Encoded Evidence
Davis, R.E. | 2009
59
CPE Quiz #86, based on volume 5, 2002
Oringel, Joey | 2003
59
CPE Quiz #97 - Based on volume 4, 2004
Chan, Sally | 2005
59
CPE Quiz #110 - Based on Volume 5, 2006
Rafeq, A. | 2007
59
CPE Quiz #104 - Based on Volume 5,2005
Chan, Sally | 2006
62
Plus - CE Quiz #74, Based on Volume 5, 2000, IS Auditing and the 21st Century: Are We Prepared?
Oringel, Joey | 2001
63
How to Use a New Computer Audit Fraud Prevention and Detection Tool
Lanza, Richard B. | 2004
63
CPE Quiz #116 - Based on Volume 5, 2007
Chan, Sally | 2008
67
CPE Quiz #91, based on volume 4, 2003
Oringel, Joe | 2004
Plus - ISACA Bookstore Price List Supplement
| 2002
Plus - ISACATM Bookstore Price Last Supplement
| 2001
ISACA Bookstore Price List Supplement
| 2005
Plus - ISACA Bookstore Offerings - Supplement
| 2000

Similar titles