IT auditing: using controls to protect information assets/ Chris Davis, Mike Schiller with Kevin Wheeler.
By: Davis, Chris
Contributor(s): Schiller, Mike | Wheeler, Kevin
Material type:
Item type | Home library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
KCPLibrary | GC 005.8 D261 2011 (Browse shelf) | Available | 9599 |
Browsing KCPLibrary shelves Close shelf browser
GC 005.8 C697 2018 Collaborative cyber threat intelligence: detecting and responding to advanced cyber attacks at the national level/ | GC 005.8 C951 2008 Scene of the cyber crime/ | GC 005.8 C994 2018 Cyber security. | GC 005.8 D261 2011 IT auditing: using controls to protect information assets/ | GC 005.8 F299 2004 How to do everything to fight spam, viruses, pop ups, and spyware/ | GC 005.8 G275 2014 Cyber intelligence/ | GC 005.8 G822 2015 CISSP guide to security essentials/ |
Includes index
There are no comments on this title.