Advanced Search

  • SEARCHING...
  • SEARCHING...

Detail Record


XML

ISACA Journal: Cybersecurity 360-Degree Vision, Vol. 5, 2015

Columns
1.) Information Security Matters: Stanley Baldwin's Bomber. --Steven J. Ross.
2.) The Network. --Daniela Gschwend.
3.) IS Audit Basics: Auditors and Large Software Projects, Part 1 can Auditors Prevent Project Failure? --Ed Gelbstein.
4.) Information Ethics: Monitoring Morality is Assurance of Information Ethics Feasible? --Vasant Raval.

Features
1.) Book Review: Auditing Cloud Computing: A Security and Privacy Guide. --Larry Marks.
2.) Cybersecurity in the Quantum World. --Michele Mosca.
3.) Addressing Cybersecurity Vulnerabilities. --Omar Y. Sharkasi.
4.) The Underground Threat. --Larry G. Wlosinski.
5.) Cyberinsurance- The Challenge of Transferring Failure in a Digital, Globalized World. --Jeimy J. Cano.
6.) Accelerating Access Management to the Speed of Hacks. --Chris Sullivan.
7.) Preparing for a Cyberattack by Extanding BCM into the C-suite. --Gary Lieberman.
8.) Cybersecurity Detective Controls-Monitoring to Identify and Respond to Threats. --Fredric Greene.

Plus
1.) Crossword Puzzle. --Myles Mellor.
2.) Help Source Q&A. --Ganapathi Subramaniam.
3.) CPE Quiz #162.
4.) Standards, Guidelines, Tools and Techniques
Ross, Steven J. - Personal Name
Sullivan, Chris - Personal Name
Cano, Jeimy J. - Personal Name
Wlosinski, Omar Y. - Personal Name
Sharkasi, Omar Y. - Personal Name
Mosca, Michele - Personal Name
Marks, Larry - Personal Name
Gschwend, Daniela - Personal Name
Totade, Smita - Personal Name
Subramaniam, Ganapathi - Personal Name
Greene, Fredric - Personal Name
Mellor, Myles - Personal Name
Gelbstein, Ed - Personal Name
Raval, Vasant - Personal Name
Lieberman, Gary - Personal Name
Vol. 5, 2015
Jurnal ISACA 16x11
1944-1967
Jurnal ISACA
Jurnal
Inggris
ISACA
2015
USA
59 hlm
Box No. 9 P (Jurnal Internasional)
LOADING LIST...
LOADING LIST...