ISACA Journal: Opportunities and Challenges of New Technology, Vol. 2, 2015
Column
1.) Information Security Matters: Cyberwhatsit. --Steven J. Ross.
2.) The Network. --Lilia Liu Chung.
3.) IS Audit Basics: Successful Audits Do Not Just Happen. --Ed Gelbstein.
4.) Information Ethics: Information Technology and Innovation Ethics. --Vasant Raval.
Features
1.) Book Review: The Soft Edge: Where Great Companies Find Lasting Success. --Dino Ippoliti.
2.) Book Review: Governance of Enterprise IT Based on COBIT 5: A Management Guide. --Maria Patricia Prandini
3.) Internet of Things Offers Great Opportunities and Much Risk. --Marcelo Hector Gonzalez.
4.) Strategic Aligment and E-Health Governance. --Elena Beratarbide, THomas W. Kelsey, Hermenegildo Gil.
5.) Cloud Insecurities. --Larry G. Wlosinski.
6.) Selected COBIT 5 Processes for Essential Enterprise Security. --Fericc Greene.
7.) Evaluating Information Security Solutions. --Kerry A. Anderson.
8.) A Practical Approach to Continuous Controls Monitoring. --David Vohradsky.
9.) Checking the Maturity of Security Policies for Information and Communication. --Mauricio Rocha Lyra, COBIT Foundation.
Plus
1.) Help Source Q&A. --Ganapathi Subramaniam.
2.) Crossword Puzzle. --Myles Mellor.
3.) CPE Quiz #159. --Smita Totade.
4.) Standards, Guidlines, Tools and Techniques.
5.) ISACA Bookstore Supplement.
1.) Information Security Matters: Cyberwhatsit. --Steven J. Ross.
2.) The Network. --Lilia Liu Chung.
3.) IS Audit Basics: Successful Audits Do Not Just Happen. --Ed Gelbstein.
4.) Information Ethics: Information Technology and Innovation Ethics. --Vasant Raval.
Features
1.) Book Review: The Soft Edge: Where Great Companies Find Lasting Success. --Dino Ippoliti.
2.) Book Review: Governance of Enterprise IT Based on COBIT 5: A Management Guide. --Maria Patricia Prandini
3.) Internet of Things Offers Great Opportunities and Much Risk. --Marcelo Hector Gonzalez.
4.) Strategic Aligment and E-Health Governance. --Elena Beratarbide, THomas W. Kelsey, Hermenegildo Gil.
5.) Cloud Insecurities. --Larry G. Wlosinski.
6.) Selected COBIT 5 Processes for Essential Enterprise Security. --Fericc Greene.
7.) Evaluating Information Security Solutions. --Kerry A. Anderson.
8.) A Practical Approach to Continuous Controls Monitoring. --David Vohradsky.
9.) Checking the Maturity of Security Policies for Information and Communication. --Mauricio Rocha Lyra, COBIT Foundation.
Plus
1.) Help Source Q&A. --Ganapathi Subramaniam.
2.) Crossword Puzzle. --Myles Mellor.
3.) CPE Quiz #159. --Smita Totade.
4.) Standards, Guidlines, Tools and Techniques.
5.) ISACA Bookstore Supplement.
Ross, Steven J. - Personal Name
Subramaniam, Ganapathi - Personal Name
Lyra, Mauricio Rocha - Personal Name
Vohradsky, David - Personal Name
Greene, Fredric - Personal Name
Wlosinski, Larry G. - Personal Name
Gil, Hermenegildo - Personal Name
Kelsey, Thomas W. - Personal Name
Beratarbide, Elena - Personal Name
Djurica, Jana - Personal Name
Gonzalez, Marcelo Hector - Personal Name
Ippoliti, Dino - Personal Name
Chung, Lilia Liu - Personal Name
Mellor, Myles - Personal Name
Anderson, Kerry A. - Personal Name
Gelbstein, Ed - Personal Name
Prandini, Maria Patricia - Personal Name
Raval, Vasant - Personal Name
Totade, Smita - Personal Name
Subramaniam, Ganapathi - Personal Name
Lyra, Mauricio Rocha - Personal Name
Vohradsky, David - Personal Name
Greene, Fredric - Personal Name
Wlosinski, Larry G. - Personal Name
Gil, Hermenegildo - Personal Name
Kelsey, Thomas W. - Personal Name
Beratarbide, Elena - Personal Name
Djurica, Jana - Personal Name
Gonzalez, Marcelo Hector - Personal Name
Ippoliti, Dino - Personal Name
Chung, Lilia Liu - Personal Name
Mellor, Myles - Personal Name
Anderson, Kerry A. - Personal Name
Gelbstein, Ed - Personal Name
Prandini, Maria Patricia - Personal Name
Raval, Vasant - Personal Name
Totade, Smita - Personal Name
Vol. 2, 2015
Jurnal ISACA 15x112
1944-1967
Jurnal ISACA
Jurnal
Inggris
ISACA
2015
USA
59 hlm
Box No. 9 P (Jurnal Internasional)
LOADING LIST...
LOADING LIST...