- Documentojopdf0801-auditing-ibm.pdfcaricato daJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcaricato daJerome B. Agliam
- DocumentoRefining IT Processes Using COBITcaricato daJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcaricato daJerome B. Agliam
- DocumentoRefining IT Processes Using COBITcaricato daJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcaricato daJerome B. Agliam
- DocumentoRefining IT Processes Using COBITcaricato daJerome B. Agliam
- DocumentoCentralized Security Managementcaricato daJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Center.pdfcaricato daJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Centercaricato daJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Center.pdfcaricato daJerome B. Agliam
- DocumentoChanges to Information Processescaricato daJerome B. Agliam
- DocumentoPrinciples of Governancecaricato daJerome B. Agliam
- DocumentoThe IS Auditor's Consideration of Irregularitiescaricato daJerome B. Agliam
- DocumentoImplementing Enterprise Securitycaricato daJerome B. Agliam
- DocumentoIT Governance - Why a Guidelinecaricato daJerome B. Agliam
- DocumentoRisk Assessment Tools - A Primercaricato daJerome B. Agliam
- DocumentoImplementing Enterprise Securitycaricato daJerome B. Agliam
- DocumentoThe Computer Forensics and Cybersecurity Governance Modelcaricato daJerome B. Agliam
- DocumentoSpotlight on Governance.pdfcaricato daJerome B. Agliam
- DocumentoSpotlight on Governancecaricato daJerome B. Agliam
- DocumentoUsing CAATs to Support IS Auditcaricato daJerome B. Agliam
- DocumentoSpotlight on Governance.pdfcaricato daJerome B. Agliam
- DocumentoSecurity Architecturecaricato daJerome B. Agliam
- DocumentoImpact of SAS No. 94 on Computer Audit Techniquescaricato daJerome B. Agliam
- DocumentoBlack Box Logging and Tertiary Monitoring of Continuous Assurance Systemscaricato daJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMcaricato daJerome B. Agliam
- DocumentoISACA Standardscaricato daJerome B. Agliam
- DocumentoSimplify and Layer Your Security Approach to Protect Card Datacaricato daJerome B. Agliam
- DocumentoInformation Security From a Business Perspective - A Lottery Sector Case Studycaricato daJerome B. Agliam
- DocumentoRecords Retentioncaricato daJerome B. Agliam
- DocumentoHacking Exposedcaricato daJerome B. Agliam
- DocumentoSensitive Datacaricato daJerome B. Agliam
- DocumentoA Young Professional’s Guide to Career Success Using Soft Skillscaricato daJerome B. Agliam
- DocumentoDo governments have the right to compel corporations to divulge information if governments see national (or local) safety at stake?caricato daJerome B. Agliam
- DocumentoAuditing Biometrics-based Authentication Systemscaricato daJerome B. Agliam
- DocumentoThe Relevance of IT in Criminal Investigationscaricato daJerome B. Agliam
- DocumentoRisk Management When Implementing ERP Systemscaricato daJerome B. Agliam
- DocumentoFederation of E-governmentcaricato daJerome B. Agliam
- DocumentoSecurity and Privacy vs. Computer Forensics Capabilitiescaricato daJerome B. Agliam
- DocumentoWho Audits Auditorscaricato daJerome B. Agliam
- DocumentoJopdf0705 Turning a Securitycaricato daJerome B. Agliam
- DocumentoOne of Today’s Most Overlooked Security Threats—Six Ways Auditors Can Fight Itcaricato daJerome B. Agliam
- DocumentoPrivacy PKIcaricato daJerome B. Agliam
- DocumentoExecutive and Board Roles in Information Securitycaricato daJerome B. Agliam
- DocumentoIS Auditing Standards in Malaysiacaricato daJerome B. Agliam
- DocumentoData Warehouse Audits Promote and Sustain Reporting System Valuecaricato daJerome B. Agliam
- DocumentoSAS70 Reportscaricato daJerome B. Agliam
- DocumentoeBusiness Trust Inhibitorscaricato daJerome B. Agliam