Book Review: Information Technology Risk Management in Enterprise Environments (English)
- New search for: Kanhere, V.
- New search for: Kanhere, V.
In:
ISACA JOURNAL
;
5
;
14
;
2010
-
ISSN:
- Article (Journal) / Print
-
Title:Book Review: Information Technology Risk Management in Enterprise Environments
-
Contributors:Kanhere, V. ( author )
-
Published in:ISACA JOURNAL ; 5 ; 14
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2010-01-01
-
Size:14 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Are Software Flaws a Security Problem?Ross, Steven J. et al. | 2015
- 3
-
Information Security Matters: Information Security in the Multi-Modal EraRoss, Steven J. et al. | 2017
- 3
-
Information Security Matters: Why We FailedRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: The Train of DangerRoss, S.J. et al. | 2011
- 4
-
Information Security Matters: Emo, Ergo SumRoss, S.J. et al. | 2013
- 4
-
Information Security Matters: Unsung Security HeroesRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: Is Security a Wall or a Door?Ross, S.J. et al. | 2012
- 4
-
CyberCERTRoss, S.J. et al. | 2014
- 4
-
Information Security Matters: The Mayor and the SheriffRoss, S.J. et al. | 2010
- 5
-
IS Audit Basics: Helping Auditees Prepare for an IS/IT AuditGelbstein, Ed et al. | 2015
- 6
-
Cloud Computing: Managing Data With a Streamlined SolutionSelway, P. / Schulte, J. et al. | 2013
- 6
-
The NetworkMurphy, Kevin et al. | 2018
- 6
-
IS Audit Basics: Doing More With LessCooke, Ian et al. | 2017
- 6
-
The Three Lines of Defence Related to Risk GovernanceDoughty, K. et al. | 2011
- 6
-
Cloud Computing: Cloud Storage-Bursting Through the HypeBarrasso, R. / Wallace, M. et al. | 2012
- 7
-
IS Audit Basics: The Soft Skills Challenge, Part 4Gelbstein, Ed / Baldi, Stefano et al. | 2016
- 7
-
IT Audit Basics: Mitigating IT Risks for Logical AccessSingleton, T.W. et al. | 2010
- 8
-
IS Auditing Basics: Auditing the IoTCooke, Ian / Raghu, R. V. et al. | 2018
- 8
-
Machine EthicsRaval, V. et al. | 2014
- 8
-
Information Ethics: Where the Rubber Meets the RoadRaval, V. et al. | 2013
- 9
-
Cloud Computing: Governance in the CloudKirkpatrick, J. et al. | 2011
- 9
-
Information Ethics: Ethics in COBIT 5Raval, V. et al. | 2012
- 10
-
Cloud Computing: Cloud Application Enables ViralMint to Turn Potential Disaster Into SuccessMandalam, Siva / Dighe, Rohan et al. | 2015
- 11
-
Five Questions WithSchperberg, R. et al. | 2010
- 11
-
What Every IT Auditor Should Know About Computer-generated ReportsSingleton, T. et al. | 2014
- 11
-
IT Audit Basics: Auditing IT Risk Associated With Change Management and Application DevelopmentSingleton, T.W. et al. | 2011
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Social MediaSingleton, T.W. et al. | 2012
- 12
-
IS Audit Basics: What Every IT Auditor Should Know About Transforming Data for CAATsSingleton, T. et al. | 2013
- 12
-
Book Review: The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber CriminalsKivisild, A. Krista et al. | 2015
- 13
-
The Practical Aspect: Mergers and Acquisitions, Should Internal Audit Be Involved in Due Diligence?Raval, Vasant / Jalan, Chandni et al. | 2018
- 13
-
Book Review: Smart Grid Security: An End-to-End View of Security in the New Electrical GridIppoliti, Dino et al. | 2015
- 13
-
The Practicle Aspect: Blind Spots On The Cloud PlatformRaval, Vasant / Lux, Don et al. | 2017
- 13
-
Book Review: Fraud 101: Techniques and Strategies for Understanding Fraud, 3^r^d EditionMichaelson, G. et al. | 2010
- 14
-
Information Ethics: The Challenge of Being ``Good''Raval, Vasant et al. | 2016
- 14
-
Vendor Risk Management DemystifiedPatel, Dipti et al. | 2015
- 14
-
Book Review: Information Technology Risk Management in Enterprise EnvironmentsKanhere, V. et al. | 2010
- 15
-
An Approach Toward Sarbanes-Oxley ITGC Risk AssessmentMehta, A. et al. | 2010
- 15
-
Understanding the Core Concepts in COBIT 5De Haes, S. / Debreceny, R. / Van Grembergen, W. et al. | 2013
- 15
-
Imperfect Technologies and Digital HygieneGelbstein, E. et al. | 2014
- 17
-
Vendor Governance in the Age of Information SecurityHeald, Arian Eigen et al. | 2015
- 17
-
IT Governance and the Cloud: Principles and Practice for Governing Adoption of Cloud ComputingSpeed, R. et al. | 2011
- 17
-
Design With the End in MindSathiyamurthy, Sudhakar et al. | 2017
- 17
-
Guest Editorial: Digital Transformation Insight for 21^s^t Century OrganizationsTouhill, Gregory J. et al. | 2018
- 18
-
Book Review: Handbook for Internal AuditorsKarin, H. et al. | 2012
- 19
-
Social Networks and Privacy-Threats and ProtectionNdiandukue, G.-H.N. et al. | 2012
- 20
-
Sponsored Feature: Innovating Internal Audit to Unlock ValueYoung, Clay / Kiaer, Erik et al. | 2018
- 20
-
The Value of Big Data Analytics to the BusinessMohapatra, B. / Parisa, V. / Banerjee, J. et al. | 2014
- 20
-
Seven Ways SMEs Can Benefit From GRC SolutionsWilhelms, D. et al. | 2010
- 20
-
How to Audit the Human Element and Assess Your Organization's Security RiskPendergast, Tom et al. | 2016
- 22
-
A Case for a Process-based Approach to GRCRamanathan, S. et al. | 2010
- 22
-
Digital Transformation? Boards Are Not Ready for ItPearce, Guy et al. | 2018
- 23
-
Using COBIT 5 for Data Breach PreventionNicho, M. / Fakhry, H. et al. | 2013
- 23
-
IT General and Application Controls: The Model of InternalizationPalmas, E. et al. | 2011
- 24
-
Blockchain: Identifying Risk on the Road to Distributed LedgersCaron, Filip et al. | 2017
- 24
-
Three Ways to Simplify Auditing Software Security Requirements and DesignSethi, Rohit / Foroughi, Ehsan et al. | 2015
- 24
-
Meeting PCI DSS When Using a Cloud Service ProviderAhmed, A. et al. | 2012
- 25
-
Cyberinsurance: Value Generator or Cost Burden?Ishaq, Syed K. et al. | 2016
- 27
-
The Price of MobilityYu, W.E. et al. | 2014
- 27
-
Impacts of Blockchain on the Auditing ProfessionBrender, Nathalie / Gauthier, Marion et al. | 2018
- 27
-
Analyzing IT Value Management at KLM Through the Lens of Val ITDe Haes, S. / Gemke, D. / Thorp, J. / Van Grembergen, W. et al. | 2011
- 28
-
Risk-based Approach to IT Systems Life Cycle and Change ControlJegousse, L. et al. | 2010
- 29
-
Deep Web Data Extraction Based on URL and Domain ClassificationBanu, B. Aysha / Chitra, M. et al. | 2015
- 30
-
Instilling a Culture of Security Starts With Information GovernanceKelly, T. Sean et al. | 2017
- 31
-
A COBIT Approach to Regulatory Compliance and Defensible DisposalLuellig, L. / Frazier, J. et al. | 2013
- 31
-
Privacy Assurance for BYODChaudhary, A. et al. | 2014
- 31
-
Manage Requirements Volatility to Manage Risks in IS Development ProjectsSakthivel, S. et al. | 2010
- 31
-
Cloud Risk-10 Principles and a Framework for AssessmentVohradsky, D. et al. | 2012
- 32
-
An Integrated Approach for Cyberthreat Monitoring Using Open-source SoftwareCaliskan, Furkan et al. | 2016
- 33
-
How Boards Engage in Digital Strategy and OversightDe Haes, Steven / Caluwe, Laura / Joshi, Anant / Huygh, Tim et al. | 2018
- 33
-
Security and Privacy Challenges of IoT-enabled SolutionsSubramanian, Sivarama / Gopal, Varadarajan Vellore / Muthusamy, Marimuthu et al. | 2015
- 35
-
FISMA 2010: What It Means for IT Security ProfessionalsModi, T. et al. | 2010
- 35
-
Beyond BYOD-Can I Connect My Body to Your Network?Pozza, G. et al. | 2014
- 35
-
In-memory Computing-Evolution, Opportunity and RiskYu, W.E. et al. | 2013
- 35
-
Barriers and Enablers to Auditors Accepting Generalized Audit SoftwareBradford, Marianne / Henderson, Dave et al. | 2017
- 35
-
The Impact of Governance on Identity Management ProgramsEtges, R. / Ruysam, A. et al. | 2011
- 37
-
Balancing the Cybersecurity BattlefieldBhasker, Daksha et al. | 2016
- 37
-
Auditing Linux/Unix Server Operating SystemsRahman, Muhammad Mushfiqur et al. | 2015
- 39
-
Manage What Is Known and What Is Not KnownFu, Z. / Lainhart, J.W. / Stubbs, A. et al. | 2014
- 39
-
A Framework for Estimating ROI of Automated Internal ControlsDutta, A. / Dopp, D. et al. | 2011
- 40
-
Solving the Identity and Access Management ConundrumRavindran, S.T. et al. | 2013
- 41
-
Planning for Information Security Testing—A Practical ApproachKorpela, Karina / Weatherhead, Paul et al. | 2016
- 41
-
Giving Sustainability to COBIT PO9Prisca, V. / Moreira, M. et al. | 2010
- 42
-
How Strong Is Strong User Authentication?Campi, A. et al. | 2012
- 43
-
Addressing Shared Risk in Product Application Vulnerability AssessmentsWerneburg, Michael et al. | 2017
- 43
-
Bitcoin Boosting BusinessWardini, Josh et al. | 2018
- 44
-
State and impact of Governance of Enterprise IT in OrganizationsDe Haes, Steven / Joshi, Anant / Van Grembergen, Wim et al. | 2015
- 44
-
How to Measure Security From a Governance PerspectiveVolchkov, A. et al. | 2013
- 45
-
Use of the Balanced Scorecard for IT Risk ManagementKapur, R. et al. | 2010
- 45
-
The Significance of the Dodd-Frank ActMarks, L. et al. | 2011
- 46
-
A Little Bit of History Repeating Itself-Nolan's Stages Theory and the Modern IS AuditorHollyhead, A. / Robson, A. et al. | 2012
- 47
-
Anatomy of an IoT DDoS Attack and Potential Policy ResponsesMukundhan, Hari et al. | 2017
- 48
-
Speeding Up Software Delivery With Effective Change ManagementBass, Evan / Haskins-Hafer, W. Noel et al. | 2018
- 49
-
Leading Change and Transformation in Information SecurityMasika, J.S. et al. | 2014
- 50
-
Data Protection Act and GAPP AlignmentKhan, Mohammed J. et al. | 2015
- 51
-
A Critical Perspective on Safeguard Selection ProcessesBeissel, Stefan et al. | 2016
- 52
-
Assessing and Managing IT Operational and Service Delivery RiskCopley, J. / Parekh, U. et al. | 2014
- 54
-
Tools: Can Penetration Testing Tools Help an Audit?Moyle, Ed et al. | 2017