Information technology controls

Results: 1397



#Item
111Communication / Architecture / Building engineering / Technology / Information / Automated Logic Corporation / Building automation / Network protocols / BACnet

ACHIEVING INTEROPERABILITY BACnet: Answers to Frequently Asked Questions A primer on the revolutionary development in the building automation and controls industry—

Add to Reading List

Source URL: www.bacnet.org

Language: English - Date: 1998-10-16 14:30:11
112Risk / Internal control / Audit / Information technology controls / Entity-level controls / Auditing / Accountancy / Business

BUSINESS MANAGEMENT Internal controls for small business 2008 UPDATE CPA Slate Blue

Add to Reading List

Source URL: www.cpaaustralia.com.au

Language: English
113Computing / Information technology management / Risk analysis / ISO/IEC 27002 / ISO/IEC 27001 / Information security management system / Information security / Security controls / Vulnerability / Data security / Computer security / Security

Microsoft Word - NewIso17799PolicyV2.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:12:49
114Public safety / National security / Crime prevention / Information security / Security controls / Physical security / Federal Information Security Management Act / Information technology audit / Information security management system / Security / Computer security / Data security

Policy Number (A155) University-wide Policy Information Security Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
115Intel / Information technology controls / Computer hardware / Electronics / Computer security / Host Based Security System / McAfee VirusScan / McAfee / Computing / Companies listed on the New York Stock Exchange

Data Sheet McAfee Configuration Control Audit, control, and enforce for continuous compliance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-15 15:26:19
116Accountancy / Zachman Framework / Internal control / Sarbanes–Oxley Act / Enterprise architecture / Information technology controls / Committee of Sponsoring Organizations of the Treadway Commission / Auditing / Business / Information technology management

Microsoft Word - Governance_White_Paper.doc

Add to Reading List

Source URL: www.ies.aust.com

Language: English - Date: 2014-03-26 21:28:32
117Computing / Computer network security / Information security / National security / Information Technology Security Assessment / Security controls / Central Intelligence Agency / Federal Information Security Management Act / NIST Special Publication 800-53 / Computer security / Data security / Security

NIST Special PublicationSecurity Self-Assessment Guide for Information Technology Systems Marianne Swanson

Add to Reading List

Source URL: www.fda.gov

Language: English
118Data security / Corporate governance / Information security / Chief financial officer / Public safety / Internal control / Management / Information technology controls / Committee of Sponsoring Organizations of the Treadway Commission / Auditing / Security / Computer security

Solving your TPP14-05 Compliance Requirements Control Self Assessment Software

Add to Reading List

Source URL: iab.nsw.gov.au

Language: English - Date: 2015-02-08 22:32:55
119Computing / Computer law / Federal Information Security Management Act / Information technology management / National Institute of Standards and Technology / Information security / Performance measurement / Security controls / Security management / Computer security / Data security / Security

NIST SPRevision 1, Performance Measurement Guide for Information Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 14:52:35
120Computing / ISO/IEC 27001 / Information technology management / Information security management system / ISO/IEC 27000 / ISO / Security controls / Information security / TickIT / Data security / Security / Computer security

Press Release TeleWare Gains ISOCertification ~ Adopting an Information Security Management System (ISMS) to coordinate all security efforts – both electronic and physical – coherently, consistently and cost-

Add to Reading List

Source URL: www.teleware.com

Language: English - Date: 2012-10-11 04:07:01
UPDATE