IT Auditing : Using Controls To Protect Information Assets
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
McGraw Hill
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
amikomlib-1659 |
---|---|
record_format |
oai_dc |
spelling |
amikomlib-16592016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAIT Auditing : Using Controls To Protect Information AssetsChris DavisPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the lMcGraw HillTEXT |
institution |
Universitas Amikom Yogyakarta |
collection |
Perpustakaan Yogyakarta |
topic |
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the l |
spellingShingle |
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the l Chris Davis IT Auditing : Using Controls To Protect Information Assets |
description |
|
format |
TEXT |
author |
Chris Davis |
author_facet |
Chris Davis |
author_sort |
Chris Davis |
title |
IT Auditing : Using Controls To Protect Information Assets |
title_short |
IT Auditing : Using Controls To Protect Information Assets |
title_full |
IT Auditing : Using Controls To Protect Information Assets |
title_fullStr |
IT Auditing : Using Controls To Protect Information Assets |
title_full_unstemmed |
IT Auditing : Using Controls To Protect Information Assets |
title_sort |
it auditing : using controls to protect information assets |
publisher |
McGraw Hill |
publishDate |
|
_version_ |
1742475366149128192 |