Database audit

Results: 369



#Item
341Data security / Crime prevention / National security / Computer network security / Information security / Database management system / Security controls / Information technology audit / Application server / Security / Computer security / Cyberwarfare

Highlights Table of Contents Findings Recommendations Topeka, KS,

Add to Reading List

Source URL: www.uspsoig.gov

Language: English - Date: 2014-07-15 16:47:15
342Security / Information technology management / Database activity monitoring / Operating system / File system / Security information and event management / Telecommunications data retention / Computer file / Information technology audit / Computing / Computer security / Data security

Whitepaper Auditing Unstructured Data Identity-Aware Storage, File Activity Monitoring, and Compliance Reporting Across Platforms • ...

Add to Reading List

Source URL: www.criticism.com

Language: English - Date: 2012-03-30 15:07:14
343Oracle Corporation / Oracle Database / Audit Record Generation and Utilization System / X Window System / Software / Computing / UML Partners

Best Practices in Deploying Global World-Class Support for Argus Healthcare industry

Add to Reading List

Source URL: www.c3i-inc.com

Language: English - Date: 2014-07-11 07:37:55
344Payback period / Sustainability / Energy service company / Energy conservation / Energy / Energy audit

Energy Savings from Audits Analysis from the Carbon Trust’s Close Out database Prepared for DECC December 2013

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-06-24 13:26:17
345National security / Terrorism / Terrorist Screening Database / Hostage Rescue Team / Terrorist Identities Datamart Environment / National Counterterrorism Center / Terrorist Screening Center / Violent Gang and Terrorist Organization File / Counter-terrorism / Federal Bureau of Investigation / Security

Audit of the FBI’s Terrorist Watchlist Nomination Practices

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2012-06-14 16:26:15
346Computer data logging / Log analysis / Data / Audit trail / Database / Email / Transaction log / Log management and intelligence / Database management systems / Computing / Data management

Aardvark Secure Solution Brief

Add to Reading List

Source URL: www.d2k.com

Language: English - Date: 2005-10-07 07:43:16
347Sampling / Computer-aided audit tools / Database / Data management / Statistics / Science / Data analysis / Scientific method

CYBAEA Viewpoint March 2012 When Big Data Maters Summary

Add to Reading List

Source URL: s.cybaea.net

Language: English - Date: 2012-12-10 09:49:13
348Business intelligence / Marketing / Proposal / Request for proposal / Database / Functional requirement / Audit / Backup / SAS / Business / Sales / Procurement

ANNEXURE- I HARYANA HIS PRE-BID QUERIES RESPONSE[removed]S.No Bidding Document

Add to Reading List

Source URL: www.haryanahealth.nic.in

Language: English - Date: 2014-01-28 23:42:16
349Business intelligence / Marketing / Proposal / Request for proposal / Database / Functional requirement / Audit / Backup / SAS / Business / Sales / Procurement

ANNEXURE- I HARYANA HIS PRE-BID QUERIES RESPONSE[removed]S.No Bidding Document

Add to Reading List

Source URL: haryanahealth.nic.in

Language: English - Date: 2014-01-28 23:42:16
350Password / Internal audit / Business / Security / Information security audit / Database security / Auditing / Information technology audit / Risk

Canaudit Inc - IT Security Audit - Understanding and Auditing the IT Environment

Add to Reading List

Source URL: www.canaudit.com

Language: English - Date: 2013-02-04 20:02:30
UPDATE