<--- Back to Details
First PageDocument Content
Cyberwarfare / Information technology audit / Crime prevention / National security / Information security / Security controls / Database security / Vulnerability / Information technology controls / Security / Computer security / Data security
Date: 2005-09-02 09:07:58
Cyberwarfare
Information technology audit
Crime prevention
National security
Information security
Security controls
Database security
Vulnerability
Information technology controls
Security
Computer security
Data security

AUGUST[removed]REPORT NO[removed]AUDITOR GENERAL WILLIAM O. MONROE, CPA

Add to Reading List

Source URL: www.myflorida.com

Download Document from Source Website

File Size: 1,18 MB

Share Document on Facebook

Similar Documents

Information Technology – Audit 25 CFRToolkit Version  1.0   NIGC  Compliance  Division  

DocID: 1vrz9 - View Document

Information Technology Common Audit Issues

DocID: 1uVnv - View Document

EICC Validated Audit Process (VAP) VAP Operations Manual Revision 5.1 – January 2016 Information and communication technology companies working through the Electronics Industry Citizenship Coalition (EICC) www.eiccoali

DocID: 1rI76 - View Document

Economy / Business / Government Finance Officers Association / Auditing / Process management / Information systems / Enterprise modelling / Information technology management / Business process / Audit / Accounting / Dashboard

GOVERNMENT FINANCE OFFICERS ASSOCIATION (GFOA) RESEARCH AND CONSULTING CENTER Whitman County, Washington September 2015

DocID: 1rqqV - View Document

Academia / Information science / Philosophy / Axiology / Ethics / Philosophy of life / Social philosophy / Risk / Information ethics / Technology / Audit / Outline of ethics

Microsoft PowerPoint - InfoEthics and Grey Literature - poster - Oct13.pptx

DocID: 1rnPw - View Document