Information technology security audit

Results: 1663



#Item
11PIDM Logo Horizontal (Eng) Oren BG

PIDM Logo Horizontal (Eng) Oren BG

Add to Reading List

Source URL: pidm.gov.my

Language: English - Date: 2014-11-25 08:04:56
12ENTERPRISE RISK MANAGEMENT POLICY  Ref No 11

ENTERPRISE RISK MANAGEMENT POLICY Ref No 11

Add to Reading List

Source URL: pidm.gov.my

Language: English - Date: 2014-11-25 08:29:12
13Check-up 2.0  A tool for assessing your agency’s information and records management Copyright © Commonwealth of Australia 2010

Check-up 2.0 A tool for assessing your agency’s information and records management Copyright © Commonwealth of Australia 2010

Add to Reading List

Source URL: naa.gov.au

Language: English - Date: 2016-07-18 23:40:26
14Security Watch  Rebecca T. Mercuri On Auditing Audit Trails It is incumbent upon us to examine our own auditing practices

Security Watch Rebecca T. Mercuri On Auditing Audit Trails It is incumbent upon us to examine our own auditing practices

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:28:00
15Beyond HIPAA compliance: Aligning IT audit and information security to manage information risks Guidance for health care internal auditors and information security professionals Executive summary Table of contents Execut

Beyond HIPAA compliance: Aligning IT audit and information security to manage information risks Guidance for health care internal auditors and information security professionals Executive summary Table of contents Execut

Add to Reading List

Source URL: www.ahia.org

Language: English - Date: 2016-06-06 13:37:31
16OFFICE OF THE AUDITOR  DENVER SHERIFF DEPARTMENT KEEFE COMMISSARY NETWORK, LLC REVENUE AND CONTRACT COMPLIANCE AUDIT JANUARY 2009

OFFICE OF THE AUDITOR DENVER SHERIFF DEPARTMENT KEEFE COMMISSARY NETWORK, LLC REVENUE AND CONTRACT COMPLIANCE AUDIT JANUARY 2009

Add to Reading List

Source URL: www.denvergov.org

Language: English - Date: 2016-03-10 14:30:12
17Enterprise risk management for Corporates Sven Heiligtag September 14, 2012

Enterprise risk management for Corporates Sven Heiligtag September 14, 2012

Add to Reading List

Source URL: www.ccfz.ch

Language: English - Date: 2012-09-16 09:47:26
18Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
19Global Risk Centre Cover_new

Global Risk Centre Cover_new

Add to Reading List

Source URL: www.mmc.com

Language: English - Date: 2016-02-09 16:02:36
20John Keel, CPA State Auditor An Audit Report on  Performance Measures at the

John Keel, CPA State Auditor An Audit Report on Performance Measures at the

Add to Reading List

Source URL: www.vetnegligence-vaccines.com

Language: English - Date: 2012-05-17 01:33:21