1–50 of 2,274 hits
Sort by:
Sort by:
-
Information systems control journal : the magazine for IT governance professionals
TIBKAT | 1.2000 - 2008 -
Computer Aided Fraud Prevention and Detection-A Step-by-step Guide
British Library Online Contents | 2010| -
Guest Editorial: Insights From Nature-An Alternate Approach to Information Security
British Library Online Contents | 2010| -
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part I)
British Library Online Contents | 2010| -
Computer Forensics Technologies for Personally Identifiable Information Detection and Audits
British Library Online Contents | 2010| -
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part II)
British Library Online Contents | 2010| -
Taking A Look Back: Will EDP Auditors be an Extinct Species by 2000 A.D.?
British Library Online Contents | 2009 -
The OCTAVE® Approach to Information Security Risk Assessment
British Library Online Contents | 2009| -
Understanding How to Protect Web-facing Applications: Under the Covers of Requirement 6.6 of PCI
British Library Online Contents | 2009| -
IT Value: Five Critical Success Factors for Introducing Val IT
British Library Online Contents | 2009| -
Identify, Govern and Manage IT Risk Part 3: Techniques and Uses for Risk IT and Its Supporting Materials
British Library Online Contents | 2009| -
IT Value: The Challenges of Implementing Portfolio Management
British Library Online Contents | 2009| -
IT Audit Basics: What Every IT Auditor Should Know About Sampling
British Library Online Contents | 2009| -
Delivering Higher-quality Security Service Using Asset Identification in Resource-constrained Environments
British Library Online Contents | 2010| -
Using Spreadsheets and Benford's Law to Test Accounting Data
British Library Online Contents | 2010| -
The Definitive Handbook of Business Continuity Management, 2^n^d Edition
British Library Online Contents | 2010| -
Book Review: Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crime, 2^n^d Edition
British Library Online Contents | 2009| -
CobiT Security Baseline Applied to Business Web Applications: A Practical Approach for All Sizes of Organisations
British Library Online Contents | 2009| -
Identify, Govern and Manage IT Risk Part 1: Risk IT Based on CobiT Objectives and Principles
British Library Online Contents | 2009| -
Compliance Audit-A Process of Optimization, Not an Obligation
British Library Online Contents | 2009| -
Developing an Information Security and Risk Management Strategy
British Library Online Contents | 2010| -
Business Process Management Systems: The Internal Control Perspective
British Library Online Contents | 2009| -
How to Preserve Security and Autonomy While Meeting Information-sharing Directives
British Library Online Contents | 2009|
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.