nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts
|
|
|
1973 |
|
2 |
p. 16-20 |
artikel |
2 |
Abstracts & Commentaries
|
|
|
1983 |
|
2 |
p. 15-20 |
artikel |
3 |
Abstracts & Commentaries
|
|
|
1984 |
|
2 |
p. 14-20 |
artikel |
4 |
Abstracts & Commentaries
|
|
|
1977 |
|
2 |
p. 12-20 |
artikel |
5 |
Abstracts & Commentaries
|
|
|
1980 |
|
2 |
p. 14-20 |
artikel |
6 |
Abstracts & Commentaries
|
|
|
1986 |
|
2 |
p. 17-20 |
artikel |
7 |
Abstracts & Commentaries
|
|
|
1987 |
|
2 |
p. 17-20 |
artikel |
8 |
Abstracts & Commentaries
|
|
|
1975 |
|
2 |
p. 13-20 |
artikel |
9 |
Abstracts & Commentaries
|
|
|
1978 |
|
2 |
p. 11-19 |
artikel |
10 |
Abstracts & Commentaries
|
|
|
1985 |
|
2 |
p. 17-19 |
artikel |
11 |
Abstracts & Commentaries
|
|
|
1988 |
|
2 |
p. 19-20 |
artikel |
12 |
Abstracts & Commentaries
|
|
|
1979 |
|
2 |
p. 17-20 |
artikel |
13 |
Abstracts & Commentaries
|
|
|
1982 |
|
2 |
p. 17-20 |
artikel |
14 |
Abstracts & Commentaries
|
|
|
1974 |
|
2 |
p. 15-20 |
artikel |
15 |
Abstracts & Commentaries
|
|
|
1976 |
|
2 |
p. 13-19 |
artikel |
16 |
Abstracts & Commentary
|
|
|
1989 |
|
2 |
p. 17-19 |
artikel |
17 |
Abstracts & Commentary
|
|
|
1995 |
|
2 |
p. 15-17 |
artikel |
18 |
Abstracts & Commentary
|
|
|
1992 |
|
2 |
p. 17-18 |
artikel |
19 |
Abstracts & Commentary
|
|
|
1994 |
|
2 |
p. 15-17 |
artikel |
20 |
Abstracts & Commentary
|
|
|
2002 |
|
2 |
p. 18-20 |
artikel |
21 |
Abstracts & Commentary
|
|
|
1990 |
|
2 |
p. 16-18 |
artikel |
22 |
Abstracts & Commentary
|
|
|
1997 |
|
2 |
p. 18-19 |
artikel |
23 |
Abstracts & Commentary
|
|
|
1991 |
|
2 |
p. 17-19 |
artikel |
24 |
Abstracts & Commentary
|
|
|
1993 |
|
2 |
p. 16-18 |
artikel |
25 |
Abstracts & Commentary
|
|
|
1996 |
|
2 |
p. 19-20 |
artikel |
26 |
Access Control Systems for Personal Computers
|
Opaska, Walter P. |
|
1986 |
|
2 |
p. 6-8 |
artikel |
27 |
A Methodology for Case, Security, and Control
|
Braithwaite, Timothy |
|
1990 |
|
2 |
p. 1-12 |
artikel |
28 |
An Executive's Guide to the Year 2000: What You Need to Know about Your Computer Systems and How to Ensure That They Survive
|
Parker, Robert |
|
1999 |
|
2 |
p. 15 |
artikel |
29 |
An IS Audit Work Program on the Software Product Testing Process
|
Menkus, Belden |
|
2001 |
|
2 |
p. 1-8 |
artikel |
30 |
A Survey of Library System Packages
|
Adams, Donald L. |
|
1973 |
|
2 |
p. 4-8 |
artikel |
31 |
Auditing Data Communication Networks
|
Winters, Chester M. |
|
1982 |
|
2 |
p. 1-9 |
artikel |
32 |
Auditing the Microsoft Exchange Electronic Mail System
|
Bigler, Mark |
|
1998 |
|
2 |
p. 1-8 |
artikel |
33 |
Auditing The Small Office it Infrastructure
|
Miller, Lee |
|
2002 |
|
2 |
p. 12-18 |
artikel |
34 |
Audit Review of Program Code-I
|
Adams, Donald L. |
|
1975 |
|
2 |
p. 1-5 |
artikel |
35 |
Audit Review of Program Code-II
|
Weiss, Harold |
|
1975 |
|
2 |
p. 6-7 |
artikel |
36 |
Audit Software Package Evaluation
|
Knowlton, Roger A. |
|
1976 |
|
2 |
p. 1-4 |
artikel |
37 |
Book Review
|
|
|
1986 |
|
2 |
p. 16-17 |
artikel |
38 |
Book Review
|
|
|
1978 |
|
2 |
p. 9-10 |
artikel |
39 |
Book Review
|
|
|
1983 |
|
2 |
p. 14-15 |
artikel |
40 |
Book Review
|
|
|
1987 |
|
2 |
p. 14-17 |
artikel |
41 |
Book Review
|
|
|
1974 |
|
2 |
p. 13-14 |
artikel |
42 |
Book Review
|
|
|
1976 |
|
2 |
p. 10-12 |
artikel |
43 |
Book Reviews
|
|
|
1988 |
|
2 |
p. 17-19 |
artikel |
44 |
Book Reviews
|
|
|
1982 |
|
2 |
p. 15-16 |
artikel |
45 |
Book Reviews
|
|
|
1984 |
|
2 |
p. 11-14 |
artikel |
46 |
Book Reviews
|
|
|
1989 |
|
2 |
p. 19-20 |
artikel |
47 |
Book Reviews
|
|
|
1975 |
|
2 |
p. 10-12 |
artikel |
48 |
Book Reviews
|
|
|
1985 |
|
2 |
p. 13-17 |
artikel |
49 |
Book Reviews
|
|
|
1990 |
|
2 |
p. 19-20 |
artikel |
50 |
Book Reviews
|
|
|
1991 |
|
2 |
p. 16-17 |
artikel |
51 |
Briefs
|
|
|
1976 |
|
2 |
p. 20 |
artikel |
52 |
Career Advancement for the EDP Auditor
|
Perry, William E. |
|
1974 |
|
2 |
p. 1-6 |
artikel |
53 |
Chaos, Subverting Systems, and Privacy
|
Houck, Richard |
|
1986 |
|
2 |
p. 13-16 |
artikel |
54 |
Clarification & Correction
|
|
|
1975 |
|
2 |
p. 12 |
artikel |
55 |
Commentary: Discovery Of “Lost” Server Illustrates Problems That Poorly Controlled Drywall Applications Can Create
|
|
|
2001 |
|
2 |
p. 1 |
artikel |
56 |
Commentary: Remember That Fraud Is Not Something New
|
|
|
2001 |
|
2 |
p. 1 |
artikel |
57 |
Commentary: Sometimes, There is Nothing that Helps
|
|
|
1999 |
|
2 |
p. 18 |
artikel |
58 |
Commentary: Understanding The Control Of Backup Magnetic Tapes
|
|
|
2001 |
|
2 |
p. 1 |
artikel |
59 |
Commentary: why Structured Application Techniques Do Not Work
|
|
|
1999 |
|
2 |
p. 18-19 |
artikel |
60 |
Computer Crime Legislation
|
|
|
1977 |
|
2 |
p. 4 |
artikel |
61 |
Computer-Related Grime in Australia
|
FitzGerald, Kevin J. |
|
1984 |
|
2 |
p. 1-8 |
artikel |
62 |
Computing Problems in San Francisco, Los Angeles, Oakland, and Chicago
|
Menkus, Belden |
|
1992 |
|
2 |
p. 13-16 |
artikel |
63 |
Conference Calendar
|
|
|
1984 |
|
2 |
p. 7 |
artikel |
64 |
Controlling the Systems Programmer
|
King, Jonathan |
|
1989 |
|
2 |
p. 1-5 |
artikel |
65 |
Control of Burroughs Patch Command
|
Saar, Frederick A. |
|
1977 |
|
2 |
p. 7-8 |
artikel |
66 |
Creating a New Control Environment
|
Padula, Gary |
|
1995 |
|
2 |
p. 9-14 |
artikel |
67 |
Cumulative Subject Index Volumes Xx-Xxx July 1993-June 2003
|
|
|
2003 |
|
2 |
p. 1-30 |
artikel |
68 |
Debit Card Policy and Procedure Questionnaire
|
Salzman, Thomas |
|
1996 |
|
2 |
p. 8-18 |
artikel |
69 |
Developing an Information Assurance Learning Program Based on ACADEMICS
|
Phillips, Timothy |
|
2007 |
|
2 |
p. 1-24 |
artikel |
70 |
Do Computers Lie?
|
Dunshie, Charles R. |
|
1974 |
|
2 |
p. 7-9 |
artikel |
71 |
Editorial
|
|
|
1987 |
|
2 |
p. 7 |
artikel |
72 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 13, Number 2
|
|
|
1985 |
|
2 |
p. 1 |
artikel |
73 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 14, Number 2
|
|
|
1986 |
|
2 |
p. 1 |
artikel |
74 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 23, Number 2
|
|
|
1995 |
|
2 |
p. 1 |
artikel |
75 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 24, Number 2
|
|
|
1996 |
|
2 |
p. 1 |
artikel |
76 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 11, Number 2
|
|
|
1983 |
|
2 |
p. 1 |
artikel |
77 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 2
|
|
|
1994 |
|
2 |
p. 1 |
artikel |
78 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 2, Number 2
|
|
|
1974 |
|
2 |
p. 1 |
artikel |
79 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 8, Number 2
|
|
|
1980 |
|
2 |
p. 1 |
artikel |
80 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 10, Number 2
|
|
|
1982 |
|
2 |
p. 1 |
artikel |
81 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 12, Number 2
|
|
|
1984 |
|
2 |
p. 1 |
artikel |
82 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 17, Number 2
|
|
|
1989 |
|
2 |
p. 1 |
artikel |
83 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 3, Number 2
|
|
|
1975 |
|
2 |
p. 1 |
artikel |
84 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 5, Number 2
|
|
|
1977 |
|
2 |
p. 1 |
artikel |
85 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 15, Number 2
|
|
|
1987 |
|
2 |
p. 1 |
artikel |
86 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 16, Number 2
|
|
|
1988 |
|
2 |
p. 1 |
artikel |
87 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 18, Number 2
|
|
|
1990 |
|
2 |
p. 1 |
artikel |
88 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 19, Number 2
|
|
|
1991 |
|
2 |
p. 1 |
artikel |
89 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 25, Number 2
|
|
|
1997 |
|
2 |
p. 1 |
artikel |
90 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 7, Number 2
|
|
|
1979 |
|
2 |
p. 1 |
artikel |
91 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 1, Number 2
|
|
|
1973 |
|
2 |
p. 1 |
artikel |
92 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 2
|
|
|
1992 |
|
2 |
p. 1 |
artikel |
93 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 21, Number 2
|
|
|
1993 |
|
2 |
p. 1 |
artikel |
94 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 4, Number 2
|
|
|
1976 |
|
2 |
p. 1 |
artikel |
95 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 6, Number 2
|
|
|
1978 |
|
2 |
p. 1 |
artikel |
96 |
EDPAA Group Visits China
|
Dunmore, Dave |
|
1986 |
|
2 |
p. 8-10 |
artikel |
97 |
EDP Audit Special Interest Groups
|
|
|
1973 |
|
2 |
p. 15 |
artikel |
98 |
EDP Risk Analysis for Contingency Planning
|
Fitzgerald, Jerry |
|
1978 |
|
2 |
p. 1-8 |
artikel |
99 |
Effective Monitoring and Project Management Reporting of Year 2000 Activities
|
Parker, Robert |
|
1999 |
|
2 |
p. 15-16 |
artikel |
100 |
Employee Internet Use
|
Andrews, Rich |
|
1997 |
|
2 |
p. 11-16 |
artikel |
101 |
Equity's Auditors Sentenced
|
|
|
1975 |
|
2 |
p. 9 |
artikel |
102 |
Even EDP Experts ERR
|
|
|
1973 |
|
2 |
p. 15 |
artikel |
103 |
Executive Guide: Measuring Performance and Demonstrating Results of Information Technology Investments
|
Hoenig, Christopher |
|
1998 |
|
2 |
p. 18 |
artikel |
104 |
Exploring Security Frontiers 31st Annual Seminar and Exhibits
|
|
|
1985 |
|
2 |
p. 12 |
artikel |
105 |
Federal Standards Issued
|
|
|
1976 |
|
2 |
p. 9 |
artikel |
106 |
Feedback on “Futures” Article
|
|
|
1977 |
|
2 |
p. 8-9 |
artikel |
107 |
Foreign Corrupt Practices Act of 1977
|
|
|
1980 |
|
2 |
p. 6-8 |
artikel |
108 |
Future Publications
|
|
|
1973 |
|
2 |
p. 15 |
artikel |
109 |
Gait for Business and Information Technology Risk
|
Marks, Norman |
|
2008 |
|
2 |
p. 7-23 |
artikel |
110 |
Gmail and Privacy Issues
|
Freeman, Edward H. |
|
2006 |
|
2 |
p. 15-20 |
artikel |
111 |
Hardware Developments
|
|
|
1975 |
|
2 |
p. 8-9 |
artikel |
112 |
Has EDP Audit Progressed in the Last 15 Years?
|
Weber, Ron |
|
1987 |
|
2 |
p. 1-6 |
artikel |
113 |
I'll Take an Order of Data Sensitivity with some Integrity on the Side: Finding A Balance within Access Control Models
|
Ferson, Patricia |
|
2004 |
|
2 |
p. 13-18 |
artikel |
114 |
Implementing Information Lifecycle Security (ILS)
|
Reed, Bill |
|
2007 |
|
2 |
p. 18-24 |
artikel |
115 |
Insurance Company use of ACL for Windows
|
Schofield, Edward |
|
1996 |
|
2 |
p. 5-7 |
artikel |
116 |
Integrating the Planning and Control of Auditing at the Toronto Transit Commission: (Conclusion)
|
Beecroft, Richard |
|
2001 |
|
2 |
p. 1-9 |
artikel |
117 |
Integrity Considerations in Distributed Systems
|
Patrick, Robert L. |
|
1980 |
|
2 |
p. 1-6 |
artikel |
118 |
Legal and Recordkeeping Issues that are Associated with the Management of Web Sites
|
Reed, Barbara |
|
2000 |
|
2 |
p. 1-10 |
artikel |
119 |
Management Support for Edp Auditing
|
Perry, William E. |
|
1976 |
|
2 |
p. 5-9 |
artikel |
120 |
Managing Enterprise Risk in Today's World of Sophisticated Threats: A Framework for Developing Broad-Based, Cost-Effective Information Security Programs
|
Ross, Ron |
|
2007 |
|
2 |
p. 1-10 |
artikel |
121 |
Managing the Most Critical Internet Security Vulnerabilities: One Effective Approach
|
Singleton, Tommie |
|
2002 |
|
2 |
p. 1-11 |
artikel |
122 |
Marketing the Information System Security Program
|
Eakin, David |
|
1995 |
|
2 |
p. 1-9 |
artikel |
123 |
Measuring the Effectiveness of the EDP Audit Process
|
Perry, William |
|
1988 |
|
2 |
p. 7-12 |
artikel |
124 |
Microfilm Records
|
|
|
1977 |
|
2 |
p. 5-7 |
artikel |
125 |
More about Understanding Security and Audit Issues in Electronic Document Interchange
|
Menkus, Belden |
|
1998 |
|
2 |
p. 14-17 |
artikel |
126 |
New Books
|
|
|
1984 |
|
2 |
p. 10 |
artikel |
127 |
Of Interest
|
|
|
1985 |
|
2 |
p. 6-12 |
artikel |
128 |
Of Interest
|
|
|
1989 |
|
2 |
p. 14-17 |
artikel |
129 |
Of Interest
|
|
|
1996 |
|
2 |
p. 20 |
artikel |
130 |
Of Interest
|
|
|
1999 |
|
2 |
p. 19-20 |
artikel |
131 |
Of Interest
|
|
|
2001 |
|
2 |
p. 1-2 |
artikel |
132 |
Of Interest
|
|
|
1983 |
|
2 |
p. 8-11 |
artikel |
133 |
Of Interest
|
|
|
1992 |
|
2 |
p. 18-20 |
artikel |
134 |
Of Interest
|
|
|
1994 |
|
2 |
p. 17-20 |
artikel |
135 |
Of Interest
|
|
|
1995 |
|
2 |
p. 17-20 |
artikel |
136 |
Of Interest
|
|
|
1998 |
|
2 |
p. 18-20 |
artikel |
137 |
Of Interest
|
|
|
2000 |
|
2 |
p. 1-2 |
artikel |
138 |
Of Interest
|
|
|
1977 |
|
2 |
p. 9-12 |
artikel |
139 |
Of Interest
|
|
|
1980 |
|
2 |
p. 9-13 |
artikel |
140 |
Of Interest
|
|
|
1984 |
|
2 |
p. 9-10 |
artikel |
141 |
Of Interest
|
|
|
1991 |
|
2 |
p. 19-20 |
artikel |
142 |
Of Interest
|
Schaller, Carol A. |
|
1978 |
|
2 |
p. 20 |
artikel |
143 |
Of Interest
|
|
|
1986 |
|
2 |
p. 10-13 |
artikel |
144 |
Of Interest
|
|
|
1987 |
|
2 |
p. 8-13 |
artikel |
145 |
Of Interest
|
|
|
1988 |
|
2 |
p. 14-17 |
artikel |
146 |
Of Interest
|
|
|
1990 |
|
2 |
p. 12-16 |
artikel |
147 |
Of Interest
|
|
|
1997 |
|
2 |
p. 19-20 |
artikel |
148 |
Of Interest
|
|
|
1979 |
|
2 |
p. 12-16 |
artikel |
149 |
Of Interest
|
|
|
1982 |
|
2 |
p. 11-12 |
artikel |
150 |
Of Interest
|
|
|
1993 |
|
2 |
p. 18-20 |
artikel |
151 |
Practical Guide to Client/Server Computing
|
Ryan, Hugh |
|
1998 |
|
2 |
p. 17-18 |
artikel |
152 |
Product Information
|
|
|
1982 |
|
2 |
p. 10 |
artikel |
153 |
Product News
|
|
|
1974 |
|
2 |
p. 10-12 |
artikel |
154 |
Quis Cusodiet Ipsos Custodes?
|
|
|
2003 |
|
2 |
p. 17-20 |
artikel |
155 |
RACF Implementation - A Case History
|
Waddill, Samuel P. |
|
1979 |
|
2 |
p. 1-12 |
artikel |
156 |
Reader Feedback
|
|
|
1982 |
|
2 |
p. 13-15 |
artikel |
157 |
Reader Feedback
|
|
|
1980 |
|
2 |
p. 13-14 |
artikel |
158 |
Reader Feedback
|
|
|
1983 |
|
2 |
p. 12-14 |
artikel |
159 |
Reader Feedback
|
|
|
1987 |
|
2 |
p. 13 |
artikel |
160 |
Reader Feedback
|
|
|
1978 |
|
2 |
p. 9 |
artikel |
161 |
Reader Feedback
|
|
|
1979 |
|
2 |
p. 17 |
artikel |
162 |
Rebuttal
|
|
|
1974 |
|
2 |
p. 9-10 |
artikel |
163 |
Reviews
|
|
|
1992 |
|
2 |
p. 16 |
artikel |
164 |
Risk Management Systems: Understanding the Need
|
Levine, Robert |
|
2004 |
|
2 |
p. 1-13 |
artikel |
165 |
RoboGuards Nab Bads, Track Goods
|
Everett, H. R. |
|
1999 |
|
2 |
p. 16-17 |
artikel |
166 |
Sarbanes-Oxley Act Requirements Mean Fast Growth for Hotline Service
|
|
|
2004 |
|
2 |
p. 18-20 |
artikel |
167 |
Sarbanes-Oxley and Enterprise Security: It Governance and What it Takes to Get the Job Done
|
Brown, William |
|
2005 |
|
2 |
p. 1-20 |
artikel |
168 |
Security and Control Considerations for a Computer Virus-Free Microcomputer
|
Marcella, Albert |
|
1993 |
|
2 |
p. 1-6 |
artikel |
169 |
Security Publication Available
|
|
|
1973 |
|
2 |
p. 15 |
artikel |
170 |
Selecting an IT Control Framework
|
Schlarman, Steven |
|
2007 |
|
2 |
p. 11-17 |
artikel |
171 |
Setting the Stage for Storage Area Networks
|
Burgener, Eric |
|
1999 |
|
2 |
p. 17-18 |
artikel |
172 |
Seven Habits of Highly Successful Enterprise E-Mail Managers
|
Vandermeer, Jim |
|
2006 |
|
2 |
p. 1-15 |
artikel |
173 |
Six Common Myths About the Simple Network Management Protocol
|
Kaufman, David |
|
1998 |
|
2 |
p. 8-13 |
artikel |
174 |
Some Thoughts on the Future of IS Auditing
|
Menkus, Belden |
|
2000 |
|
2 |
p. 1-10 |
artikel |
175 |
Source and Object Compare Audit Software
|
Dallas, Dennis A. |
|
1983 |
|
2 |
p. 1-7 |
artikel |
176 |
Support Tool Reviews
|
|
|
1995 |
|
2 |
p. 14-15 |
artikel |
177 |
Support Tool Reviews
|
|
|
1996 |
|
2 |
p. 18-19 |
artikel |
178 |
Support Tool Reviews
|
|
|
1994 |
|
2 |
p. 14-15 |
artikel |
179 |
Support Tool Reviews
|
|
|
1997 |
|
2 |
p. 17-18 |
artikel |
180 |
Support Tool Reviews
|
|
|
1993 |
|
2 |
p. 15-16 |
artikel |
181 |
System Intrusions and Law Enforcement
|
Spafford, Eugene |
|
1996 |
|
2 |
p. 1-5 |
artikel |
182 |
Telecommunication Toll Fraud
|
Liu, Rosina |
|
1997 |
|
2 |
p. 1-10 |
artikel |
183 |
The Audit of Software Maintenance
|
Pruijm, R. A. M. |
|
1986 |
|
2 |
p. 1-5 |
artikel |
184 |
The Cost of Poor Testing: A U.S. Government Study (Part 2)
|
Carroll, Charles T. |
|
2003 |
|
2 |
p. 1-16 |
artikel |
185 |
The CPA Looks to the Past
|
Weiss, Harold |
|
1973 |
|
2 |
p. 1-3 |
artikel |
186 |
The Latest Security Threat: Open-Book Management
|
Wood, Charles Cresson |
|
1994 |
|
2 |
p. 10-14 |
artikel |
187 |
The One-Sided Van Contract—The Other EDI Legal Issue
|
Capuder, Lawrence |
|
1993 |
|
2 |
p. 6-14 |
artikel |
188 |
The Postimplementation Audit
|
Walsh, Robert |
|
1989 |
|
2 |
p. 5-14 |
artikel |
189 |
The Role of Information Systems Auditing in Systems Development
|
Burns, Tom |
|
1991 |
|
2 |
p. 1-9 |
artikel |
190 |
The Role of the Auditor in Planning a Successful Information Processing Automation Project
|
Braithwaite, Timothy |
|
1994 |
|
2 |
p. 1-9 |
artikel |
191 |
The Top 10 Lies Wireless Marketers Tell
|
Rogak, Lisa |
|
2001 |
|
2 |
p. 1-2 |
artikel |
192 |
The use of Audit Indicator and Integrated Test Facility Techniques
|
|
|
1973 |
|
2 |
p. 8-11 |
artikel |
193 |
To a Recent Cadmus Education Foundation Session of “Edp Audit and Control”
|
Schaffer, Eleanor O. |
|
1973 |
|
2 |
p. 11-15 |
artikel |
194 |
Two IBM Security Publications
|
|
|
1985 |
|
2 |
p. 19 |
artikel |
195 |
Understanding the Unix Operating System
|
Menendez, Doug |
|
1991 |
|
2 |
p. 9-16 |
artikel |
196 |
Use of a Microcomputer to Assist in Systems-Based Auditing
|
Brodie, Don G. |
|
1985 |
|
2 |
p. 1-6 |
artikel |
197 |
Using an Expert System to Peel the Computer virus Onion
|
Davis, Russell |
|
1992 |
|
2 |
p. 1-12 |
artikel |
198 |
Using Regression Analysis as an Analytical is Audit Tool
|
Lanza, Richard |
|
1999 |
|
2 |
p. 1-15 |
artikel |
199 |
Virtual Private Networks: Turning the Internet into Your Private Network
|
Scott, Charlie |
|
1999 |
|
2 |
p. 16 |
artikel |
200 |
Visible Ops Security: Achieving Common Security and it Operations Objectives in Four Practical Steps
|
Kim, Gene |
|
2008 |
|
2 |
p. 1-7 |
artikel |
201 |
11 Ways to a Faster Applications Audit
|
Yarberry, William |
|
1988 |
|
2 |
p. 1-7 |
artikel |
202 |
“We Tried ITF - We Liked ITF”
|
Munson, James E. |
|
1977 |
|
2 |
p. 1-4 |
artikel |
203 |
Working with CICS and ACF2
|
Afmed, Tahir |
|
1988 |
|
2 |
p. 13 |
artikel |
204 |
Would You Believe $7,500,000?!?
|
Adams, Donald L. |
|
1974 |
|
2 |
p. 6 |
artikel |