Information security audit

Results: 2404



#Item
31Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
32Actuarial science / Security / Auditing / Financial markets / Enterprise risk management / Information technology audit / Risk management / Risk / Resilience / Systemic risk / Finance / The Fat Tail: The Power of Political Knowledge for Strategic Investing

Global Risk Centre Cover_new

Add to Reading List

Source URL: www.mmc.com

Language: English - Date: 2016-02-09 16:02:36
33Auditing / Audit / Professional certification / Information technology audit / Information technology controls / Computer security

John Keel, CPA State Auditor An Audit Report on Performance Measures at the

Add to Reading List

Source URL: www.vetnegligence-vaccines.com

Language: English - Date: 2012-05-17 01:33:21
34Computer security / Data security / Computer network security / Security controls / Security / Information security / Information technology controls / Information technology audit / Vulnerability / Audit / Professional certification / ISO/IEC JTC 1/SC 27

Microsoft Word - NISTRev 4 Information Security Assessment Template (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:08
35Auditing / Computer security / Data security / Entity-level controls / Management accounting / Internal control / Audit / Information security / Security controls / Internal audit / Statement on Auditing Standards No. 70: Service Organizations

DOCX Document

Add to Reading List

Source URL: abs.org.sg

Language: English - Date: 2016-02-04 09:38:58
36Auditing / Management / Information technology audit / Security / Cryptography / Audit / Internal audit / Risk management / Computer security / Eide Bailly LLP / Information technology controls

fondo abstracto de tecnologia 3d.Lenguaje binario

Add to Reading List

Source URL: www.eidebailly.com

Language: English - Date: 2015-09-30 10:06:33
37Network management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile / Log management / Log analysis / Information technology security audit

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: log-management.it

Language: English - Date: 2014-05-07 13:40:47
38Data security / Crime prevention / Cryptography / Information governance / National security / Regulatory compliance / Audit / Computer security / Internal audit / Business process management / Vulnerability / Security information and event management

A FORESITE WHITE PAPER THE ART AND SCIENCE OF COMPLIANCE INTRODUCTION Today, regulatory and legislative compliance obligations seem endless and ever-changing. Corporations are faced with enormous challenges

Add to Reading List

Source URL: foresite.com

Language: English - Date: 2016-02-17 15:35:27
39Auditing / Actuarial science / Information governance / Management / Security / Enterprise risk management / Corporate governance / Audit / Information security / Internal control / Management system / Risk management

63 PIDM Annual Report 2015 Section

Add to Reading List

Source URL: www.pidm.gov.my

Language: English - Date: 2016-04-25 15:55:36
40Information privacy / Government / Regulatory compliance / Data security / Privacy / Data Protection Directive / Better Regulation Commission / Audit / Law / Privacy Commissioner / Privacy law

A next-generation privacy framework Examples in action and precedents Introduction The principles of European data protection provide a sound foundation for regulation. But economic, societal and technological changes ha

Add to Reading List

Source URL: www.bof.nl

Language: English - Date: 2016-02-02 08:43:56
UPDATE