Information technology governance

Results: 5268



#Item
41Cybersecurity Forum August 19, 2015 COBIT 5 Lets Play 50 Questions (more or less)

Cybersecurity Forum August 19, 2015 COBIT 5 Lets Play 50 Questions (more or less)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2015-08-19 23:26:10
42Evaluation of Filesystem Provenance Visualization Tools Michelle A. Borkin, Student Member, IEEE, Chelsea S. Yeh, Madelaine Boyd, Peter Macko, Krzysztof Z. Gajos, Margo Seltzer, Member, IEEE, and Hanspeter Pfister, Senio

Evaluation of Filesystem Provenance Visualization Tools Michelle A. Borkin, Student Member, IEEE, Chelsea S. Yeh, Madelaine Boyd, Peter Macko, Krzysztof Z. Gajos, Margo Seltzer, Member, IEEE, and Hanspeter Pfister, Senio

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2013-10-16 20:19:42
43MayRETENTION, PRESERVATION – WHAT’S THE DIFFERENCE?

MayRETENTION, PRESERVATION – WHAT’S THE DIFFERENCE?

Add to Reading List

Source URL: www.huschblackwell.com

Language: English - Date: 2016-01-07 19:04:24
44Robert L. Bogue MS MVP, MCSE, MCSA:SecurityCreating your SharePoint

Robert L. Bogue MS MVP, MCSE, MCSA:SecurityCreating your SharePoint

Add to Reading List

Source URL: www.thorprojects.com

Language: English - Date: 2015-07-23 13:04:59
45f a c t  s h e e t SAS/GRAPH® Software Present data in charts, graphs and maps within multiple

f a c t s h e e t SAS/GRAPH® Software Present data in charts, graphs and maps within multiple

Add to Reading List

Source URL: www.sas.com

Language: English - Date: 2008-05-08 16:15:10
46DignusGroup - Program & Project Management Solutions Your Success is Our Success. - To which DignusGroup has developed 5 Point Program that ensures the successful completion of your project ON TIME & ON BUDGET With our 5

DignusGroup - Program & Project Management Solutions Your Success is Our Success. - To which DignusGroup has developed 5 Point Program that ensures the successful completion of your project ON TIME & ON BUDGET With our 5

Add to Reading List

Source URL: www.dignusgroup.com

Language: English - Date: 2012-11-21 16:34:07
47A/71/67*−E*  United Nations General Assembly Economic and Social Council

A/71/67*−E* United Nations General Assembly Economic and Social Council

Add to Reading List

Source URL: unctad.org

Language: English - Date: 2016-06-14 08:08:40
48SECURITY COMPLIANCE MANAGEMENT  COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

SECURITY COMPLIANCE MANAGEMENT COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
49Request an Invite: Chief Audit Executive/Audit Roundtables Name:________________________________________________________________________________________________ First-time attendee?  Yes  No  Organization:_________

Request an Invite: Chief Audit Executive/Audit Roundtables Name:________________________________________________________________________________________________ First-time attendee?  Yes  No Organization:_________

Add to Reading List

Source URL: www.resourcenter.net

Language: English - Date: 2016-04-14 14:08:51
50RUTGERS POLICY Section: Section Title: Information Technology Policy Name: Acceptable Use Policy for Information Technology Resources Formerly Book: N/A Approval Authority: Senior Vice President for Administration

RUTGERS POLICY Section: Section Title: Information Technology Policy Name: Acceptable Use Policy for Information Technology Resources Formerly Book: N/A Approval Authority: Senior Vice President for Administration

Add to Reading List

Source URL: policies.rutgers.edu

Language: English - Date: 2016-08-22 21:33:41