Information technology security audit

Results: 1663



#Item
271Computer security / Risk / Information technology audit / Data security / Information security / International Association of Privacy Professionals / Audit / Privacy / Internal audit / Auditing / Ethics / Security

2012_PPM_Pages_r6-125.indd

Add to Reading List

Source URL: privacyassociation.org

Language: English - Date: 2014-08-15 09:59:58
272Auditing / Ethics / Risk management / Enterprise risk management / Information technology audit / Security / IT risk management / Tactical Risk Management / Actuarial science / Risk / Management

RISK MANAGEMENT The Company’s Enterprise Risk Management (ERM) framework continues to provide a simple and effective management process that aids business units across the organisation to identify and review risks and

Add to Reading List

Source URL: mtr.com.hk

Language: English - Date: 2012-03-28 04:30:30
273Relational database management systems / Password / Oracle Database / Oracle Corporation / Database audit / Copyright / Computer security / Database security / Password policy / Security / Information technology management / Software

Oracle_Security_Masterclass_WH2008

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2008-09-29 13:22:01
274Internet privacy / Information technology controls / Privacy / Information security audit / Information security / Ethics / Accountability / Freedom of information legislation

The Bureau of the Fiscal Service Privacy Impact Assessment Personnel Action Workflow System (PAWS) The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational ef

Add to Reading List

Source URL: fiscal.treasury.gov

Language: English - Date: 2015-02-25 09:14:19
275Unix / Operating system / Risk / Computer-aided audit tools / Business / Computer network security / Information technology security audit / Database audit / Information technology audit / Auditing / Audit

Secure4Audit S4Software, Inc. Datalynx, Inc. Seamless Scalable Security Solutions

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2010-03-23 17:54:52
276Data security / Audit / Risk / Computing / Security / Information technology audit / Auditing / Certified Information Systems Auditor

Microsoft Word - 1415wi_ISOM4100_syllabus_v1c.docx

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2014-11-28 14:08:25
277Data security / Risk / Audit / Computing / Security / Information technology audit / Auditing / Certified Information Systems Auditor

Microsoft Word - syllabus_v2a

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2013-11-21 12:47:31
278Computer forensics / Mobile device forensics / Proactivity / Forensic science / Law enforcement / Knowledge / Department of Defense Cyber Crime Center / Digital forensics / Information technology audit / Computer security

Microsoft PowerPoint - Bradford.ppt

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-12 21:43:36
279Data security / Audit / Risk / Computing / Security / Information technology audit / Auditing / Certified Information Systems Auditor

Microsoft Word - 1415fa_ISOM4100_syllabus_v1d.docx

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2014-09-01 18:06:17
280Data security / Risk / Computer security / Security / Information technology management / Information Systems Audit and Control Association / Certified Information Systems Auditor / Internal audit / CISA / Auditing / Information technology audit / Accountancy

Microsoft Word - ISOM4300_syllabus_Sum1314

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2014-07-16 14:45:10
UPDATE