<--- Back to Details
First PageDocument Content
Mobile device forensics / Forensic science / Subscriber identity module / Government procurement in the United States / Computer security / Security / Espionage / Digital forensics / Mobile computers / Information technology audit
Date: 2008-02-25 14:46:12
Mobile device forensics
Forensic science
Subscriber identity module
Government procurement in the United States
Computer security
Security
Espionage
Digital forensics
Mobile computers
Information technology audit

Add to Reading List

Source URL: www.cftt.nist.gov

Download Document from Source Website

File Size: 255,08 KB

Share Document on Facebook

Similar Documents

Information Technology – Audit 25 CFRToolkit Version  1.0   NIGC  Compliance  Division  

DocID: 1vrz9 - View Document

Information Technology Common Audit Issues

DocID: 1uVnv - View Document

EICC Validated Audit Process (VAP) VAP Operations Manual Revision 5.1 – January 2016 Information and communication technology companies working through the Electronics Industry Citizenship Coalition (EICC) www.eiccoali

DocID: 1rI76 - View Document

Economy / Business / Government Finance Officers Association / Auditing / Process management / Information systems / Enterprise modelling / Information technology management / Business process / Audit / Accounting / Dashboard

GOVERNMENT FINANCE OFFICERS ASSOCIATION (GFOA) RESEARCH AND CONSULTING CENTER Whitman County, Washington September 2015

DocID: 1rqqV - View Document

Academia / Information science / Philosophy / Axiology / Ethics / Philosophy of life / Social philosophy / Risk / Information ethics / Technology / Audit / Outline of ethics

Microsoft PowerPoint - InfoEthics and Grey Literature - poster - Oct13.pptx

DocID: 1rnPw - View Document