Database audit

Results: 369



#Item
171Cyberwarfare / Information technology audit / Information security / National security / Vulnerability / Audit / IT risk / Database security / Computer security / Security / Data security

NISD-K304-111 Management Standards for Information Security Measures for the Central Government Computer Systems

Add to Reading List

Source URL: www.nisc.go.jp

Language: English - Date: 2013-01-31 20:44:38
172Energy economics / Aerodynamics / Compressors / Gas turbine / Marine propulsion / Distributed generation / Sustainable energy / Energy audit / Energy service company / Energy / Energy conservation / Technology

DOE MID-ATLANTIC CLEAN ENERGY APPLICATION CENTER -- RESOURCE LIST – No formal evaluation of the companies or organizations identified in this database has been performed, therefore there is no endorsement, implied or o

Add to Reading List

Source URL: maceac.psu.edu

Language: English
173Computer security / Transaction processing / Information technology audit / Vulnerability / Database / Information security audit / Information security / Database management systems / Information technology management / Computing

Part One - Information Technology Planning Questionnaire (ITPQ) Attachment 1

Add to Reading List

Source URL: www.in.gov

Language: English - Date: 2014-11-24 10:12:03
174Physics / Thermodynamics / Exergy / Thermodynamic free energy / Energy service company / Distributed generation / Energy audit / Gas turbine / Energy / Energy conservation / Technology

DOE MID-ATLANTIC CLEAN ENERGY APPLICATION CENTER -- RESOURCE LIST – No formal evaluation of the companies or organizations identified in this database has been performed, therefore there is no endorsement, implied or o

Add to Reading List

Source URL: maceac.psu.edu

Language: English - Date: 2011-04-18 22:28:00
175Risk / Continuous auditing / Audit / Financial audit / Internal audit / Database audit / Institute of Internal Auditors / Internal control / Computer-aided audit tools / Auditing / Accountancy / Business

Microsoft Word - v3n2a7.doc

Add to Reading List

Source URL: raw.rutgers.edu

Language: English - Date: 2009-08-21 16:13:20
176Database audit / Auditing / Audit / Information technology audit

PDF Document

Add to Reading List

Source URL: elections.myflorida.com

Language: English - Date: 2009-04-23 16:19:32
177Apple Inc. / Oracle Database / Barbara Gordon / IPhone / Software / Computing / Oracle Corporation

From: Lawson Carolyn Sent: Wednesday, November 27, 2013 3:17 PM To: Powell Steve Subject: Re: Request for patching window in Exadata This is because I have been asking for an audit of work against what we are paying for

Add to Reading List

Source URL: katubim.s3.amazonaws.com

Language: English - Date: 2014-04-29 21:51:24
178Database / Database theory

North Carolina Department of Health and Human Services Division of Medical Assistance Audit Section One Bank of America Plaza, 421 Fayetteville Street • Raleigh, N.C[removed] Mail Service Center • Raleigh, N.

Add to Reading List

Source URL: www.ncdhhs.gov

Language: English - Date: 2008-06-23 10:06:53
179Business / Continuous auditing / Database audit / Internal audit / Audit / ACL / Internal control / Information technology audit process / Computer-aided audit tools / Auditing / Accountancy / Risk

Microsoft Word - THE CONTINUOUS AUDIT OF ONLINE SYSTEMS 3.doc

Add to Reading List

Source URL: raw.rutgers.edu

Language: English - Date: 2010-05-07 11:26:57
180Risk / Audit / External auditor / Internal control / Corporate governance / Accounting scandals / Materiality / Database audit / Continuous auditing / Auditing / Business / Accountancy

1 BLACK BOX LOGGING AND TERTIARY MONITORING OF CONTINUOUS ASSURANCE SYSTEMS By Michael Alles, Alexander Kogan and Miklos Vasarhelyi, Rutgers Business School given

Add to Reading List

Source URL: raw.rutgers.edu

Language: English - Date: 2009-08-24 12:11:06
UPDATE