Using Neural Network Software as a Forensic Accounting Tool (English)
- New search for: Cerullo, Michael J.
- New search for: Cerullo, M.Virginia
-
ISSN:
- Article (Journal) / Print
-
Title:Using Neural Network Software as a Forensic Accounting Tool
-
Author / Creator:
-
Published in:
-
Publisher:
- New search for: ISACA, Serving IT Governance Professionals
-
Place of publication:Rolling Meadows, Ill., the magazine for IT governance professionals
-
Publication date:2006
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.64
- Further information on Basic classification
-
Classification:
BKL: 54.64 Datenbanken -
Source:
-
Export:
-
Share:
-
Citation:
Table of contents – Volume 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 4
-
IS Security Matters: IS Security Matters?Ross, S.J. | 2010
- 5
-
Editorial - Issues & CommentsCangemi, Michael | 2006
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses how terrorist attacks will cause companies and governments to increase their investments in biometrics.Cangemi, Michael | 2002
- 5
-
Taking a Look Back: Data Security Excerpted and reprinted from The EDP Auditor Journal, Winter 1980| 2009
- 5
-
Guest Editorial: IT Governance Comes of AgeHolt, Alison | 2008
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, announces a unique issue of the Information Systems Control Journal, one devoted to IT governance and lends his thoughts on how the topic is aligned with the ISACA vision statementCangemi, Michael P. | 2000
- 5
-
Issues&CommentsCangemi, M. P. | 2007
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael P Cangemi, CISA, CK discusses biometrics, the joy of book collecting and e-business, and notes the passing of an IS audit pioneer. A list of biometrics vendors accompanies the column.Cangemi, Michael P. | 2001
- 6
-
Guest Editorial: Business Reform and Change Enabled by IT-An Alternative PerspectiveHayes, T. | 2009
- 6
-
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part II)Singleton, T.W. | 2010
- 8
-
IS Security Matters: Converging Need, Diverging ResponseRoss, Steven J. | 2006
- 8
-
Book Review - Auditing and Security: AS-400, NT, UNIX, Networks and Disaster Recovery Plans - This book is an excellent text on the issues that IT auditors need to concentrate on to successfully audit the more common operating systems of AS-400, NT and UNIX, as well as networks.McMinn, Janine | 2002
- 8
-
IT Security Matters: Alerts, Alarms and TriggersRoss, Steven J. | 2007
- 8
-
Information Security and the Resilient EnterpriseRoss, S. J. | 2005
- 8
-
Auditing and Security: AS/400, NT, UNIX, Networks and Disaster Recovery PlansMcMinn, J. | 2002
- 8
-
IS Security Matters - No Harm, No FoulRoss, Steven J. | 2003
- 8
-
No Harm, No FoulRoss, S. J. | 2003
- 8
-
IS Security Matters: Information Security and the Resilient EnterpriseRoss, Steven J. | 2005
- 9
-
IS Security Matters: The Resilient ToothbrushRoss, Steven J. | 2008
- 9
-
"Lingering Doubt"Ross, S. | 2000
- 9
-
IS Security Matters - "Lingering Doubt" - Steve Ross, CISA, addresses the puzzlement when survey respondents answer questions one way, yet hold opinions in another directionRoss, Steve | 2000
- 9
-
The Art of Deception: Controlling the Human Element of SecurityMcMinn, J. | 2004
- 9
-
Book Review - Digital Signatures Security and Control - The review notes the book's aim of providing clarity on the central issues surrounding the safe use of the web for normal business and commercial activities and describes the content of each of its seven chapters.Backhouse, James | 2001
- 9
-
Digital Signatures Security and ControlBackhouse, J. | 2001
- 9
-
IS Security Matters: Reliable Security, RevisitedRoss, S. | 2009
- 10
-
Standards. Statements, Guidelines - ISACA(R) Member and CISA(R) Compliance| 2003
- 49
-
HelpSource Q& ALilly, Fred | 2003
- 10
-
Vive le ROIRoss, S. J. | 2002
- 10
-
IS Security Matters - Vive le ROI - Steven J. Ross, CISA, discusses the return on investment conundrum that exists when investing in security. Investing in security is not like investing in stocks and bonds. One cannot put money in and simply wait for dividends and growth.Ross, Steven J. | 2002
- 10
-
Help Source - Help Source Q & ALilly, Fred | 2004
- 11
-
IT Audit Basics: Generalized Audit Software: Effective and Efficient Tool for Today's IT AuditsSingleton, Tommie | 2006
- 11
-
IS Security Matters - Standard Questions - Steven J Ross, CISA, calls for differing, demand-driven international standards developed and disseminated after the market has decided which is best, not before.Ross, Steven J. | 2001
- 11
-
differing, demand-driven international standards developed and disseminated after the market has decided which is best, not beforeRoss, S. J. | 2001
- 11
-
IT Audit Basics: Sarbanes-Oxley StatusGallegos, Frederick | 2005
- 11
-
Sarbanes-Oxley StatusGallegos, F. | 2005
- 11
-
IT Value: Securing Value: Treasure Buried in Business CasesTieman, Chris | 2007
- 12
-
Risk-aware Decision Making for New IT InvestmentsAtaya, G. | 2003
- 12
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISA(R) designation are outlined and the status of ISACA issuances noted.| 2002
- 12
-
Standards and guidelines for maintaining compliance for both ISACA™ membership and the CISA® designation are outlined and the status of ISACA issuances noted| 2002
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About IT Audits and DataSingleton, T.W. | 2009
- 12
-
IT Governance - Risk-aware Decision Making for New IT InvestmentsAtaya, Georges | 2003
- 13
-
IT Governance: Information Security Governance: Who Needs It?Brotby, Krag | 2007
- 13
-
Effective Use of Teams for IT AuditsKrist, M. A. | 2000
- 13
-
IT Audit Basics: What Every IT Auditor Should Know About CybercrimesSingleton, Tommie W. | 2008
- 13
-
Book Reviews - Effective Use of Teams for IT AuditsKrist, Martin A. | 2000
- 14
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2006
- 15
-
Guest Editorial: Insights From Nature-An Alternate Approach to Information SecuritySayana, S.A. | 2010
- 15
-
IT Value: The Drive for Value ManagementThorp, John | 2008
- 15
-
The Vest-Pocket Guide to Information TechnologyShim, J. K. / Siegel, J. G. / Chi, R. | 2000
- 15
-
Book Reviews - The Vest-Pocket Guide to Information Technology - Both of these books, reviewed by Sarathy Emani, CISA, received high marks from the reviewer. Both contain the promised information their titles indicateShim, Jae K. / Siegel, Joel G. / Chi, Robert / Emani, Sarathy | 2000
- 15
-
IT Governance: Driving Value From Information Security: A Governance PerspectiveKanhere, V. | 2009
- 15
-
ISecurity Matters - Is the Future Unpredictable?Ross, Steven J. | 2004
- 15
-
Is the Future Unpredictable?Ross, S. J. | 2004
- 16
-
IT Audit Career Development PlanGallegos, F. | 2003
- 16
-
IT Audit Basics - IT Audit Career Development PlanGallegos, Frederick | 2003
- 17
-
Fraud Analysis Technique Using ACLVazzari, D. | 2010
- 17
-
Assessing the European IT Governance ClimatePoole, V. | 2001
- 17
-
IT Governance: New Players, Challenges and OpportunitiesJohnson, Everett C. | 2005
- 17
-
Book Reviews - Review of ISACF publication: Control Objectives for Net Centric Technology - Peter Hill, CISA succinctly, yet thoroughly, describes what the potential readers of this four-volume set can expect and how the information imparted will help them in their professionHill, Peter | 2000
- 17
-
Global Perspectives: IT Audit EducationRosenthal-Sabroux, Camille / Merhout, Jeffrey W. / Best, Peter J. | 2006
- 17
-
Review of ISACF publication: Control Objectives for Net Centric TechnologyHill, P. | 2000
- 17
-
IT Governance - Assessing the European IT Governance Climate - Vernon Poole reports on the status of IT governance in Europe in the wake of increasing security attacks and the adoption of BS 7799 as an ISO standard in September 2000.Poole, Vernon | 2001
- 18
-
Five Questions With...Karygiannis, Tom | 2008
- 18
-
R&D Collaboration: The Process, Risks and CheckpointsFinne, Thomas | 2003
- 18
-
The Role of the Auditor in IT GovernanceWoda, A. | 2002
- 18
-
Security MonitoringGumus, T. | 2010
- 18
-
Plus - HelpSource Q & ALilly, Fred L. | 2001
- 18
-
IT Governance - The Role of the Auditor in IT Governance - Alex Woda discusses the importance, now more than ever, of the auditor's involvement in supporting and helping implement corporate governance in IT and management.Woda, Alex | 2002
- 19
-
Book Review: Principles of Fraud ExaminationWells, Joseph T. / Kanhere, Vishnu | 2006
- 19
-
Computer Aided Fraud Prevention and Detection-A Step-by-step GuideKanhere, V. | 2010
- 19
-
Principles of Fraud Examination By Joseph T. WellsKanhere, V. | 2006
- 19
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 19
-
IT Audit Basics - Auditing Governance in ERP ProjectsSayana, S.Anantha | 2004
- 19
-
Auditing Governance in ERP ProjectsSayana, S. A. | 2004
- 20
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Information SecuritySingleton, Tommie W. | 2007
- 20
-
Global PerspectivesJones, Wayne / Anzola, Leonidas / Chi, John Ho | 2005
- 20
-
Top 10 Security and Privacy Topics for IT AuditorsRai, S. / Chukwuma, P. | 2010
- 21
-
Automated User Authentication: The Final Frontier of Information SecurityWilloughby, M. K. | 2001
- 21
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. | 2000
- 21
-
IT Governance: Containing Corporate Governance Costs: The Role of TechnologyJamal, Nazam / Jansen, Kees | 2006
- 21
-
Features - Automated User Authentication: The Final Frontier of Information Security - New forms of user authentication are required in the face of increasingly apparent password weaknesses. Only stronger user authentication can mount a frontal assault on the chief method information criminals use to gain unauthorized access: Masquerading as an authorized user.Willoughby, Mark K. | 2001
- 22
-
Key Success Factors for Implementing IT GovernanceGuldentops, E. | 2004
- 22
-
IT Governance - Boards and IT -- Unleash the Value, Put a Leash on the Risks - Erik Guldentops, CISA, discusses the need for boards and executives to put IT firmly onto their organization's governance agenda. Complexity, speed, interconnectivity and globalization make IT strategic to enterprise growth and render it essential for enterprise survival.Guldentops, Erik | 2002
- 22
-
Boards and IT-Unleash the Value, Put a Leash on the RisksGuldentops, E. | 2002
- 22
-
IT Governance - Key Success Factors for Implementing IT GovernanceGuldentops, Erik | 2004
- 23
-
Risk Assessment Tools: A PrimerSchreider, Tari | 2003
- 23
-
IT Governance: Practices in IT Governance and Business-IT AlignmentHaes, Steven De / Grembergen, Wim Van | 2008
- 23
-
Case Study: Building Acceptance and Adoption of COBIT at Sun MicrosystemsFrelinger, Bob | 2005
- 23
-
Building Acceptance and Adoption of CobiT at Sun MicrosystemsFrelinger, B. | 2005
- 24
-
Improving Regulatory Compliance: How to Make Content Protection Controls EffectiveMoeller, Robert | 2007
- 25
-
Features - Computer Forensics -- From Cottage Industry to Standard Practice - Computer forensics is the collection, preservation, analysis and court presentation of computer-related evidence. The proper seizure and analysis of this evidence is important in any investigation where a computer is the means or an instrument of a crime or other offense or may contain evidence relevant to an investigation.Patzakis, John M. | 2001
- 25
-
Computer Forensics-From Cottage Industry to Standard PracticePatzakis, J. M. | 2001
- 25
-
Managed Risk, Enhanced ResponseAdee, S. | 2000
- 25
-
Auditing a Security Information Management SystemNayyer, S. | 2010
- 25
-
When Chaos Rules, Only the Fittest Survive: The Impact of Disruptive Technologies on Organizational SurvivalSarup, Deepak | 2006
- 25
-
IT Audit Basics - Due Professional Care - Frederick Gallegos, CISA, CGFM, CDE, focuses on the importance and process of due professional care, in this second installment of the Journal's newest column.Gallegos, Frederick | 2002
- 25
-
Due Professional CareGallegos, F. | 2002
- 25
-
Practical Pointers - Managed Risk, Enhanced Response - Sean Adee, CISA, discusses how the next generation of security provides for real-time, consolidated, security-driven event monitoring for devices such as IDS and firewall products and the ability to monitor information from other resources such as operating systems and ERPSAdee, Sean | 2000
- 26
-
IT Governance and Corporate Governance at INGKan, A. H. G. R. | 2004
- 26
-
Case Study - IT Governance and Corporate Governance at INGRinnooy Kan, A.H.G. | 2004
- 26
-
Business Continuity Management Standards -- A Side-by-side ComparisonZawada, Brian / Schwartz, Jared | 2003
- 26
-
IT Value: Benefits Realisation and Programme Management: Beyond the Business CaseHarries, S. / Harrison, P. | 2009
- 28
-
The Unique Benefits and Risks of USB Mass Storage DevicesTharp, Tom | 2007
- 28
-
Benefits of Year 2000 Work This feature-length article is a compilation of some of the lessons learned that were results of the extensive planning and alterations that occurred in preparation for Y2K. The comments were gleaned from the contingency planning listserv| 2000
- 28
-
Developing an Information Security and Risk Management StrategyPironti, J.P. | 2010
- 28
-
Features - Benefits of Year 2000 Work - This feature-length article is a compilation of some of the lessons learned that were results of the extensive planning and alterations that occurred in preparation for Y2K. The comments were gleaned from the contingency planning listserv| 2000
- 29
-
COBIT Control and Governance Maturity Survey| 2002
- 29
-
Case Study: Assessing IT Security Governance Through a Maturity Model and the Definition of a Governance ProfileCarbonel, Jean-Christophe | 2008
- 29
-
Cybersecurity and the Future of E-commerce: The Role of the Audit CommunityPaliotta, A. R. | 2001
- 29
-
COBIT Control and Governance Maturity Survey - Participate in the COBIT Control and Governance Maturity Survey. The information gained as a result of the survey will be useful and beneficial to all who aspire to more effective IT governance.| 2002
- 29
-
Features - Cybersecurity and the Future of E-commerce: The Role of the Audit Community - The author opines that a major attack now, if successful, could significantly influence the future development of the e-commerce business model and have severe ramifications for the victimized organization(s). The article advocates the need to continue and expand the auditing community's move toward a full partnership role with management.Paliotta, Allan R. | 2001
- 30
-
The Changing Realities of RecoveryBrassil, Regina A. | 2003
- 30
-
IT Governance and Post-merger Systems IntegrationPareek, Mukul | 2005
- 31
-
A Beginner's Guide to Auditing the AS/400 Operating SystemBines, J. S. | 2002
- 31
-
A Beginner's Guide to Auditing the AS-400 Operating System - This article provides the novice auditor, IT or otherwise, with an overview of how to perform an AS-400 operating system review.Bines, Judith S. | 2002
- 31
-
Guidance on Tax Compliance for Business and Accounting Software and SAF-TShue, Lily | 2006
- 31
-
The IT Balanced Scorecard-A Roadmap to Effective Governance of a Shared Services IT OrganizationSaull, R. | 2000
- 31
-
Justifying IT Projects: Connecting the Dots From Systems to Business ValueDutta, A. | 2009
- 31
-
Case Study - The IT Balanced Scorecard - A Roadmap to Effective Governance of a Shared Services IT Organization - This article, written by Ronald Saull, MBA, CSP, Senior Vice President and Chief Information Officer of the Information Services division of Great-West Life, London Life and Investors Group, includes a discussion of the trend for consolidation and the consequent impact on IT operationsSaull, Ronald | 2000
- 32
-
Mathematical Proofs of Mayfield's Paradox: A Fundamental Principle of Information Security| 2001
- 32
-
Features - Mathematical Proofs of Mayfield's Paradox: A Fundamental Principle of Information Security - The authors provide two mathematical proofs of Mayfield's Paradox, which states that keeping everyone out of an information system requires an infinite amount of money and getting everyone onto an information system requires an infinite amount of money, but the costs between these extremes are relatively low. By The University of New Haven Center for Cybercrime and Forensic Computer Investigation and The University of Southern California Department of Mathematics| 2001
- 33
-
End Point SecurityLeo, Martin | 2008
- 33
-
What Is Your Risk Appetite? The Risk-IT ModelBooker, S. / Gardner, J. R. / Steelhammer, L. / Zumbakyte, I. | 2004
- 33
-
Using Neural Network Software as a Forensic Accounting ToolCerullo, Michael J. / Cerullo, M.Virginia | 2006
- 33
-
Developing Metrics for Effective Information Security GovernancePironti, John P. | 2007
- 33
-
Case Study - What Is Your Risk Appetite? The Risk-IT ModelBooker, Shirley / Gardner, Jerome R. / Steelhammer, Lisa / Zumbakyte, Ieva | 2004
- 34
-
Implementing Enterprise Security: A Case Study (Part 1)Doughty, K. | 2003
- 35
-
Measuring and Improving IT Governance Through the Balanced ScorecardGrembergen, Wim Van / Haes, Steven De | 2005
- 35
-
Increasing Security LevelsAlga, N. | 2002
- 35
-
Increasing Security Levels - The increasing use of technology has exposed individuals to security issues. As biometric devices become more widely used to protect valuable assets and minimize unauthorized access, the accounting profession must prepare for the impact that this is likely to have on audits.Alga, Nadia | 2002
- 36
-
People, Portfolios and Processes: The 3P Model of IT GovernanceSandrino-Arndt, Bop | 2008
- 36
-
Securing Emerging Internet ApplicationsNorifusa, M. | 2001
- 36
-
Delivering Higher-quality Security Service Using Asset Identification in Resource-constrained EnvironmentsSivasubramanian, V. | 2010
- 36
-
Features - Securing Emerging Internet Applications - As the Internet has become more popular, the fundamental infrastructure of a seamless network no longer exists and no longer guarantees widely available and transparent communication. Using standard protocols requires coordination among multiple Internet administration points. Understanding these changes is the starting point to using the new Internet.Norifusa, Masaya | 2001
- 37
-
Driving Value From Nonrevenue-generating Activities: Myths and Misunderstandings of Governance and Risk ManagementBarnier, B. | 2009
- 39
-
IT Governance Hands-on: Using COBIT to Implement IT GovernanceKordel, Luc | 2004
- 39
-
Auditing Printer SecuritySavoy, K. / Daniels, B. | 2010
- 39
-
Optimizing Controls to Test as Part of a Risk-based Audit StrategyPareek, Mukul | 2006
- 39
-
Dispelling and Construction of Social Accounting in View of Social AuditShaikh, Junaid M. / Jakpar, Shaharudin | 2007
- 40
-
The Balanced Scorecard and IT Governance This article reflects research and observation by Wim Van Grembergen, Ph.D., a prolific writer on this topic. This article, as will be others in the future, emanated from workings of the ISACA IT Governance Institute| 2000
- 40
-
Features - The Balanced Scorecard and IT Governance - This article reflects research and observation by Wim Van Grembergen, PhD, a prolific writer on this topic. This article, as will be others in the future, emanated from workings of the ISACA IT Governance InstituteGrembergen, Wim Van | 2000
- 41
-
The Computer Forensics and Cybersecurity Governance ModelBrancik, Kenneth C. | 2003
- 41
-
Features - Fighting Security Breaches and Cyberattacks with Two-Factor Authentication Technology - In response to increasing attacks, companies should spend time planning a strategic layered defense that uses overlapping computer technologies to detect, react to and deter would-be hackers. The author recommends two-factor authentication, which matches who the user is with what the user has to ensure valid, reliable identification.Walker, Tony | 2001
- 41
-
Fighting Security Breaches and Cyberattacks with Two-Factor Authentication TechnologyWalker, T. | 2001
- 42
-
Key Elements of an Information Risk Management Program: Transforming Information Security Into Information Risk ManagementPironti, John P. | 2008
- 43
-
Plus - CE Quiz #75, Based on Volume 6, 2000, E-commerce -- The Next PermutationOringel, Joey | 2001
- 43
-
How Can Security Be Measured?Chapin, David A. / Akridge, Steven | 2005
- 43
-
Siebel's eBusiness Application and Controls - This article will focus on the Siebel eBusiness application architecture and the control considerations related to the quality aspects security, integrity, auditability and controllability.Jansen, Kees | 2002
- 43
-
Mac OS X: A Secure Platform and a Valuable Security Tool in a Distributed Network EnvironmentHumphrey Jr, Robert B. | 2006
- 43
-
Siebel's eBusiness Application and ControlsJansen, K. | 2002
- 44
-
Enhancing IT Governance Through Enterprise Management Software SolutionsAyers, S. / Fentress, D. | 2000
- 44
-
Features - Enhancing IT Governance Through Enterprise Management Software Solutions - Taking a different tack from the other articles, this one is centered on key features in most enterprise management software and vendors who offer these as specific products or in suitesAyers, Susan / Fentress, Dave | 2000
- 44
-
Computer Forensics Technologies for Personally Identifiable Information Detection and AuditsPan, Y. / Stackpole, B. / Troell, L. | 2010
- 45
-
Value of IT: Beyond the TheoreticalUcedaVelez, T. | 2009
- 46
-
ERP Security and Segregation of Duties Audit: A Framework for Building an Automated SolutionHendrawirawan, David / Tanriverdi, Huseyin / Zetterlund, Carl / Hakam, Hunaid / Kim, Hyun Ho / Paik, Hyewon / Yoon, Yeohoon | 2007
- 47
-
Principles of IT GovernanceHamaker, Stacey / Hutton, Austin | 2004
- 47
-
Continuous Auditing Through Leveraging TechnologySarva, Stinivas | 2006
- 48
-
Usefulness of an Information Security Management Maturity ModelCanal, Vicente Aceituno | 2008
- 49
-
Choosing and Using Sarbanes-Oxley SoftwareBagranoff, Nancy A. / Henry, Laurie | 2005
- 49
-
Plus - CPE Quiz #69Oringel, Joey | 2000
- 51
-
CPE Quiz #87, based on volume 6, 2002Oringel, Joe | 2003
- 51
-
Social Engineering: A Tip of the IcebergDamle, P. | 2002
- 51
-
Return on Information TechnologyUnwala, Huzeifa | 2004
- 51
-
Continuous Auditing From a Practical PerspectiveHandscombe, Kevin | 2007
- 51
-
Red Teams: An Audit Tool, Technique and Methodology for Information AssuranceGallegos, Frederick / Smith, Matthew L. | 2006
- 51
-
Social Engineering: A Tip of the Iceberg - With the evolution of information technology towards constructive causes, antisocial elements have quickly followed and today one of the biggest problems faced by IT is hacking. Social engineering involves gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders.Damle, Pramod | 2002
- 52
-
The Hidden Values of IT Risk ManagementAbram, T. | 2009
- 52
-
Benchmark Yourself Against the Best in the WorldKent, Ben | 2005
- 52
-
CISAs and CISMs Working in Sync: How Their Individual Contributions Together Can Achieve Effective IT Risk ManagementSardanopoli, Vito | 2008
- 53
-
Deploying Wireless Technology-A Case for IT GovernanceOak, P. | 2002
- 53
-
Deploying Wireless Technology -- A Case for IT Governance - The success of a wireless deployment depends on the appropriateness of the components selected from each of these categories. Furthermore, the mere investment in new technologies is not enough. Its success is reliant on its deployment through such frameworks as IT governance.Oak, Pratap | 2002
- 54
-
Information Security Policies and Controls for a Trusted EnvironmentSrinivasan, S. | 2008
- 54
-
The Auditor's Prerogative to Review Internal ControlsMuthukrishnan, Ravi | 2004
- 54
-
Introduction to Voice-over IP TechnologyKhan, Kamal / Syal, Rajan / Kapila, Achal | 2005
- 56
-
Achieving Privacy Through Security MeasuresAxelrod, C.Warren | 2007
- 57
-
CPE Quiz #99 - Based on volume 6, 2004Khan, Kamal | 2005
- 57
-
Wireless LAN Risks and Vulnerabilities - This article provides an overview of how wireless LANs work, while reviewing the risks, vulnerabilities and threats that affect wireless networks differently from their wired brethren.Stanley, Richard A. | 2002
- 57
-
Wireless LAN Risks and VulnerabilitiesStanley, R. A. | 2002
- 57
-
Value Chain Control -- An IT Control Approach That Puts Business in the CentreHuijgens, Hennie | 2004
- 59
-
CPE Quiz #117 - Based on Volume 6, 2007Rafeq, A. | 2008
- 59
-
CPE Quiz #106 - Based on Volume 6, 2005Khan, Kamal | 2006
- 63
-
CPE Quiz #93, based on volume 6, 2003Oringel, Joe | 2004
- 63
-
CPE Quiz #111 - Based on Volume 6, 2006Khan, Kamal | 2007
-
Plus - ISACA Bookstore Offerings - Supplement| 2000
-
ISACA Bookstore Price List Supplement| 2005
-
Plus - ISACA Bookstore Price List - Supplement| 2000