ISACA

Results: 245



#Item
241Software / National Security Agency / Security-Enhanced Linux / Password / Operating system / Su / Principle of least privilege / Mandatory access control / Access control / System software / Computer security / System administration

Copyright © 2006 ISACA. All rights reserved. www.isaca.org. Delegating Root Authority and Auditing

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2010-03-25 01:50:27
242Business / Certified Information Security Manager / Information Systems Audit and Control Association / Information security governance / Corporate governance of information technology / Howard Schmidt / Governance / Corporate governance / Certified Information Systems Security Professional / Data security / Security / Computing

PDF Document

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2010-05-02 13:37:41
243Business / Information technology audit / Information Systems Audit and Control Association / Certified Information Systems Auditor / Information technology security audit / Internal audit / Audit committee / Audit evidence / Audit / Auditing / Accountancy / Risk

PDF Document

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2013-01-10 13:03:13
244Information technology audit / Security / Computer security / COBIT / Corporate governance of information technology / Val IT / Information technology controls / Information Systems Audit and Control Association / Information Criteria / Information technology management / Information technology governance / Data security

PDF Document

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2010-06-01 16:38:40
245Cyberwarfare / Data security / Risk analysis / Vulnerability / Threat / Information security / Countermeasure / Attack / Asset / Computer security / Security / Computer network security

PDF Document

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2010-03-25 02:55:17
UPDATE