free tracker

It Audit Control And Security

Pub Date : 2010-10-12 | Author : Robert R. Moeller | Publisher : John Wiley & Sons

ISBN 10 : 0470877685
ISBN 13 : 9780470877685

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, ar..


Computer Audit Control And Security

Pub Date : 1989-09-06 | Author : Robert R. Moeller | Publisher : Wiley

ISBN 10 : IND:30000022338986
ISBN 13 :

Offers comprehensive, up-to-date guidance on new and evolving computer audit, control, and security issues. Each chapter contains both background discussions and sets of control ob..



Cyber Security And Privacy Control

Pub Date : 2011-04-12 | Author : Robert R. Moeller | Publisher : John Wiley & Sons

ISBN 10 : 9781118035764
ISBN 13 : 1118035763

This section discusses IT audit cybersecurity and privacy control activities from two focus areas. First is focus on some of the many cybersecurity and privacy concerns that audito..


Linux Security Audit And Control Features

Pub Date : 2005-01-01 | Author : K. K. Mookhey | Publisher : ISACA

ISBN 10 : 9781893209787
ISBN 13 : 1893209784

This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security ..


Executive S Guide To Coso Internal Controls

Pub Date : 2013-12-11 | Author : Robert R. Moeller | Publisher : John Wiley & Sons

ISBN 10 : 9781118813812
ISBN 13 : 1118813812

Essential guidance on the revised COSO internal controls framework Need the latest on the new, revised COSO internal controls framework? Executive's Guide to COSO Internal Controls..


It Security Risk Control Management

Pub Date : 2016-09-14 | Author : Raymond Pompon | Publisher : Apress

ISBN 10 : 9781484221402
ISBN 13 : 1484221400

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security contro..