IT Auditing : Using Controls To Protect Information Assets

Saved in:
Bibliographic Details
Main Author: Mike Schiller
Format: TEXT
Published: McGraw Hill
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
PINJAM
id amikomlib-1658
record_format oai_dc
spelling amikomlib-16582016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAIT Auditing : Using Controls To Protect Information AssetsMike SchillerPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the lMcGraw HillTEXT
institution Universitas Amikom Yogyakarta
collection Perpustakaan Yogyakarta
topic Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the l
spellingShingle Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the l
Mike Schiller
IT Auditing : Using Controls To Protect Information Assets
description
format TEXT
author Mike Schiller
author_facet Mike Schiller
author_sort Mike Schiller
title IT Auditing : Using Controls To Protect Information Assets
title_short IT Auditing : Using Controls To Protect Information Assets
title_full IT Auditing : Using Controls To Protect Information Assets
title_fullStr IT Auditing : Using Controls To Protect Information Assets
title_full_unstemmed IT Auditing : Using Controls To Protect Information Assets
title_sort it auditing : using controls to protect information assets
publisher McGraw Hill
publishDate
_version_ 1742475365943607296