ISACA Journal: Mobile Devices, Vol. 5, 2014
1.) Information Security Matters: CyberCERT. -- Steven J. Ross, CISA, CISSP, MBCP.
2.) The Network. --Thomas Borton, CISA, CISM, CRISC, CISSP.
3.) Information Ethics: Machine Ethics. --Vasant Raval, DBA, CISA, ACMA.
4.) IS Audit Basics: What Every IT Auditor Should Know About Computer-generated Reports. --Tommie Singleton, CISA, CGEIT, CPA.
5.) Book Review: Carry On: Sound Advice From Schneier on Security. --Maria Patricia Prandini, CISA, CRISC.
6.) Book Review: Using Social Media for Global Security. --Joyce Chua, CISA, CISM, CITPM, ITIL, PMP.
7.) Imperfect Technologies and Digitsl Hygiene. --Gelbstein.
8.) The Value of Big Data Analytics to the Business. --Biswajit Mohapatra, Vinay Parisa, Joydipto Banerjee.
9.) The Price of Mobility. --William Emmanuel Yu, CISM, CRISC, CISSP, CSSLP.
10.) Privacy Assurance for BYOD. --Ashwin Chaudhary, CISA, CISM, CGEIT, CRISC, CISSP, CPA, PMP.
11.) Beyond BYOD-Can I Connect My Body to Your Network? --Giuliano Pozza.
12.) Manage What Is Known and What Is Not Known. --Zhiwei Fu, Ph.D., CISA, CGEIT, CRISC, CFE PMP,John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, CIPP/G, CIPP/US, Alan Stubbs, MAS>
13.) Leading Change and Transformation in Information Security. --John Simiyu Masika, CISA, CISM.
14.) Assessing and Managing IT Operational and Service Delivery Risk. --Jonathan Copley, CISA, Upesh Parekh, CISA.
2.) The Network. --Thomas Borton, CISA, CISM, CRISC, CISSP.
3.) Information Ethics: Machine Ethics. --Vasant Raval, DBA, CISA, ACMA.
4.) IS Audit Basics: What Every IT Auditor Should Know About Computer-generated Reports. --Tommie Singleton, CISA, CGEIT, CPA.
5.) Book Review: Carry On: Sound Advice From Schneier on Security. --Maria Patricia Prandini, CISA, CRISC.
6.) Book Review: Using Social Media for Global Security. --Joyce Chua, CISA, CISM, CITPM, ITIL, PMP.
7.) Imperfect Technologies and Digitsl Hygiene. --Gelbstein.
8.) The Value of Big Data Analytics to the Business. --Biswajit Mohapatra, Vinay Parisa, Joydipto Banerjee.
9.) The Price of Mobility. --William Emmanuel Yu, CISM, CRISC, CISSP, CSSLP.
10.) Privacy Assurance for BYOD. --Ashwin Chaudhary, CISA, CISM, CGEIT, CRISC, CISSP, CPA, PMP.
11.) Beyond BYOD-Can I Connect My Body to Your Network? --Giuliano Pozza.
12.) Manage What Is Known and What Is Not Known. --Zhiwei Fu, Ph.D., CISA, CGEIT, CRISC, CFE PMP,John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, CIPP/G, CIPP/US, Alan Stubbs, MAS>
13.) Leading Change and Transformation in Information Security. --John Simiyu Masika, CISA, CISM.
14.) Assessing and Managing IT Operational and Service Delivery Risk. --Jonathan Copley, CISA, Upesh Parekh, CISA.
Ross, Steven J. - Personal Name
Copley, Jonathan - Personal Name
Masika, John Simiyu - Personal Name
Stubbs, Alan - Personal Name
Lainhart, John W. - Personal Name
Fu, Zhiwei - Personal Name
Pozza, Giuliano - Personal Name
Chaudhry, Ashwin - Personal Name
Yu, William Emmanuel - Personal Name
Banerjee, Joydipto - Personal Name
Parisa, Vinay - Personal Name
Mohapatra, Biswajit - Personal Name
Gelbstein - Personal Name
Chua, Joyce - Personal Name
Prandini, Maria Patricia - Personal Name
Raval, Vasant - Personal Name
Borton, Thomas - Personal Name
Singleton, Tommie - Personal Name
Parekh, Upesh - Personal Name
Copley, Jonathan - Personal Name
Masika, John Simiyu - Personal Name
Stubbs, Alan - Personal Name
Lainhart, John W. - Personal Name
Fu, Zhiwei - Personal Name
Pozza, Giuliano - Personal Name
Chaudhry, Ashwin - Personal Name
Yu, William Emmanuel - Personal Name
Banerjee, Joydipto - Personal Name
Parisa, Vinay - Personal Name
Mohapatra, Biswajit - Personal Name
Gelbstein - Personal Name
Chua, Joyce - Personal Name
Prandini, Maria Patricia - Personal Name
Raval, Vasant - Personal Name
Borton, Thomas - Personal Name
Singleton, Tommie - Personal Name
Parekh, Upesh - Personal Name
Vol. 5, 2014
Jurnal ISACA 14x299
1944-1967
Jurnal ISACA
Jurnal
Indonesia
ISACA
2014
USA
59 hlm
Box No. 9 P (Jurnal Internasional)
LOADING LIST...
LOADING LIST...