IT Auditing : Using Controls To Protect Information Assets

Saved in:
Bibliographic Details
Main Author: Chris Davis
Format: TEXT
Published: McGraw Hill
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
PINJAM
id amikomlib-1659
record_format oai_dc
spelling amikomlib-16592016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAIT Auditing : Using Controls To Protect Information AssetsChris DavisPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the lMcGraw HillTEXT
institution Universitas Amikom Yogyakarta
collection Perpustakaan Yogyakarta
topic Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the l
spellingShingle Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the l
Chris Davis
IT Auditing : Using Controls To Protect Information Assets
description
format TEXT
author Chris Davis
author_facet Chris Davis
author_sort Chris Davis
title IT Auditing : Using Controls To Protect Information Assets
title_short IT Auditing : Using Controls To Protect Information Assets
title_full IT Auditing : Using Controls To Protect Information Assets
title_fullStr IT Auditing : Using Controls To Protect Information Assets
title_full_unstemmed IT Auditing : Using Controls To Protect Information Assets
title_sort it auditing : using controls to protect information assets
publisher McGraw Hill
publishDate
_version_ 1742475366149128192