<--- Back to Details
First PageDocument Content
Cyberwarfare / Data security / Information technology audit / National security / National Air and Space Museum / Security controls / Steven F. Udvar-Hazy Center / Smithsonian Institution / Inventory / Security / Computer security / Computer network security
Date: 2010-04-02 08:08:24
Cyberwarfare
Data security
Information technology audit
National security
National Air and Space Museum
Security controls
Steven F. Udvar-Hazy Center
Smithsonian Institution
Inventory
Security
Computer security
Computer network security

Microsoft Word - D-2 p[removed]Draft gray redactions ehc.docx

Add to Reading List

Source URL: www.si.edu

Download Document from Source Website

File Size: 3,35 MB

Share Document on Facebook

Similar Documents

Information Technology – Audit 25 CFRToolkit Version  1.0   NIGC  Compliance  Division  

DocID: 1vrz9 - View Document

Information Technology Common Audit Issues

DocID: 1uVnv - View Document

EICC Validated Audit Process (VAP) VAP Operations Manual Revision 5.1 – January 2016 Information and communication technology companies working through the Electronics Industry Citizenship Coalition (EICC) www.eiccoali

DocID: 1rI76 - View Document

Economy / Business / Government Finance Officers Association / Auditing / Process management / Information systems / Enterprise modelling / Information technology management / Business process / Audit / Accounting / Dashboard

GOVERNMENT FINANCE OFFICERS ASSOCIATION (GFOA) RESEARCH AND CONSULTING CENTER Whitman County, Washington September 2015

DocID: 1rqqV - View Document

Academia / Information science / Philosophy / Axiology / Ethics / Philosophy of life / Social philosophy / Risk / Information ethics / Technology / Audit / Outline of ethics

Microsoft PowerPoint - InfoEthics and Grey Literature - poster - Oct13.pptx

DocID: 1rnPw - View Document