Back to Results
First PageMeta Content
National security / Computer network security / Information technology audit / Cyberwarfare / Password / Audit trail / Operating system / Logical security / Information technology audit process / Security / Computer security / Crime prevention


Revised[removed]CHAPTER 8 INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION
Add to Reading List

Document Date: 2015-01-08 16:50:01


Open Document

File Size: 43,50 KB

Share Result on Facebook
UPDATE