Advanced Search

  • SEARCHING...
  • SEARCHING...

Detail Record


XML

ISACA Journal: Cybersecurity, Vol. 6, 2014

Columns
1.) Information Security Matters: Whiz Bang 2000. --Steven J. Ross.
2.) The Network. --Kathleen M. Stetz.
3.) Information Ethics: An Alchemy of C3: Character, College and Computers: Vasant Raval.
4.) IS Audit Basics: The Core of IT Auditing. --Tommie Singleton.

Features
1.) How Zero-trust Network Security Can Enable Recovery From Cyberattacks. --Eric A. Beck.
2.) Leveraging Industry Standards to Address Industrial Cybersecurity Risk. --Ivan Alcoforado.
3.) Bridging the GAP Between Access and Security in Big Data. --Ulf T. Mattsson.
4.) Data Owner's Responsibilities When Migrating to the Cloud. --Ed Gelbstein, Viktor Polic.
5.) From Here to Maturity-Managing the Information Security Life Cycle. --Kerry A. Anderson.
6.) Auditing Oracle Database. --Muhammad Mushfiqur Rahman.
7.) The Information Security Function: Jeimy J. Cano M.

Plus
1.) Crossword Puzzle. --Myles Mellor.
Ross, Steven J. - Personal Name
M., Jeimy J. Cano - Personal Name
Rhaman, Muhammad Mushfiqur - Personal Name
Anderson, Kerry A. - Personal Name
Gelbstein, Ed - Personal Name
Mattsson, Ulf t. - Personal Name
Alcoforado, Ivan - Personal Name
Beck, Eric A. - Personal Name
Stetz, Kathleen M. - Personal Name
Raval, Vasant - Personal Name
Polic, Viktor - Personal Name
Singleton, Tommie - Personal Name
Mellor, Myles - Personal Name
Vol. 6, 2014
Jurnal ISACA 15x68
1944-1967
Jurnal ISACA
Jurnal
Inggris
ISACA
2014
USA
59 hlm
Box No. 9 P (Jurnal Internasional)
LOADING LIST...
LOADING LIST...