- Documentjopdf0801-auditing-ibm.pdfîncărcat deJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMîncărcat deJerome B. Agliam
- DocumentRefining IT Processes Using COBITîncărcat deJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMîncărcat deJerome B. Agliam
- DocumentRefining IT Processes Using COBITîncărcat deJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMîncărcat deJerome B. Agliam
- DocumentRefining IT Processes Using COBITîncărcat deJerome B. Agliam
- DocumentCentralized Security Managementîncărcat deJerome B. Agliam
- DocumentEnhancing Security with an IT Network Awareness Center.pdfîncărcat deJerome B. Agliam
- DocumentEnhancing Security with an IT Network Awareness Centerîncărcat deJerome B. Agliam
- DocumentEnhancing Security with an IT Network Awareness Center.pdfîncărcat deJerome B. Agliam
- DocumentChanges to Information Processesîncărcat deJerome B. Agliam
- DocumentPrinciples of Governanceîncărcat deJerome B. Agliam
- DocumentThe IS Auditor's Consideration of Irregularitiesîncărcat deJerome B. Agliam
- DocumentImplementing Enterprise Securityîncărcat deJerome B. Agliam
- DocumentIT Governance - Why a Guidelineîncărcat deJerome B. Agliam
- DocumentRisk Assessment Tools - A Primerîncărcat deJerome B. Agliam
- DocumentImplementing Enterprise Securityîncărcat deJerome B. Agliam
- DocumentThe Computer Forensics and Cybersecurity Governance Modelîncărcat deJerome B. Agliam
- DocumentSpotlight on Governance.pdfîncărcat deJerome B. Agliam
- DocumentSpotlight on Governanceîncărcat deJerome B. Agliam
- DocumentUsing CAATs to Support IS Auditîncărcat deJerome B. Agliam
- DocumentSpotlight on Governance.pdfîncărcat deJerome B. Agliam
- DocumentSecurity Architectureîncărcat deJerome B. Agliam
- DocumentImpact of SAS No. 94 on Computer Audit Techniquesîncărcat deJerome B. Agliam
- DocumentBlack Box Logging and Tertiary Monitoring of Continuous Assurance Systemsîncărcat deJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMîncărcat deJerome B. Agliam
- DocumentISACA Standardsîncărcat deJerome B. Agliam
- DocumentSimplify and Layer Your Security Approach to Protect Card Dataîncărcat deJerome B. Agliam
- DocumentInformation Security From a Business Perspective - A Lottery Sector Case Studyîncărcat deJerome B. Agliam
- DocumentRecords Retentionîncărcat deJerome B. Agliam
- DocumentHacking Exposedîncărcat deJerome B. Agliam
- DocumentSensitive Dataîncărcat deJerome B. Agliam
- DocumentA Young Professional’s Guide to Career Success Using Soft Skillsîncărcat deJerome B. Agliam
- DocumentDo governments have the right to compel corporations to divulge information if governments see national (or local) safety at stake?încărcat deJerome B. Agliam
- DocumentAuditing Biometrics-based Authentication Systemsîncărcat deJerome B. Agliam
- DocumentRisk Management When Implementing ERP Systemsîncărcat deJerome B. Agliam
- DocumentThe Relevance of IT in Criminal Investigationsîncărcat deJerome B. Agliam
- DocumentFederation of E-governmentîncărcat deJerome B. Agliam
- DocumentSecurity and Privacy vs. Computer Forensics Capabilitiesîncărcat deJerome B. Agliam
- DocumentWho Audits Auditorsîncărcat deJerome B. Agliam
- DocumentJopdf0705 Turning a Securityîncărcat deJerome B. Agliam
- DocumentOne of Today’s Most Overlooked Security Threats—Six Ways Auditors Can Fight Itîncărcat deJerome B. Agliam
- DocumentPrivacy PKIîncărcat deJerome B. Agliam
- DocumentExecutive and Board Roles in Information Securityîncărcat deJerome B. Agliam
- DocumentIS Auditing Standards in Malaysiaîncărcat deJerome B. Agliam
- DocumentData Warehouse Audits Promote and Sustain Reporting System Valueîncărcat deJerome B. Agliam
- DocumentSAS70 Reportsîncărcat deJerome B. Agliam
- DocumenteBusiness Trust Inhibitorsîncărcat deJerome B. Agliam