Your search returned 35 results.

Not what you expected? Check for suggestions
|
No cover image available
Cloudifying threats : understanding cloud app attacks and defenses

by Sood, Aditya K; Jalil, Rehan.

Series: ISACA Journal.Pages: 10 pagesEdition: Vol. 1, 2018, 10 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Mobile workforce security considerations and privacy

by Ngambeket, Guy.

Series: ISACA Journal.Pages: 6 pagesEdition: Vol. 4, 2017, 6 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
The challenge of being "good"

by Raval, Vasant.

Series: ISACA Journal.Pages: 5 pagesEdition: Vol. 5, 2016, 5 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
How to audit the human element and assess your organization's security risk

by Pendergast, Tom.

Series: ISACA Journal.Pages: 5 pagesEdition: Vol. 5, 2016, 5 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Audit accounting data using Excel pivot tables : an aging of accounts receivable example

by Filzen, Joshua J; Simkin, Mark G.

Series: ISACA Journal.Pages: 5 pagesEdition: Vol. 1, 2015, 5 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Are your data secure in the cloud?

by Nye, John.

Series: ISACA Journal.Pages: 4 pagesEdition: Vol. 1, 2015, 4 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Successful audits do not just happen

by Gelbstein, Ed.

Series: ISACA Journal.Pages: 2 pagesEdition: Vol. 2, 2015, 2 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Internet of Things offers great opportunities and much risk

by Gonzalez, Marcelo Hector; Djurica, Jana.

Series: ISACA Journal.Pages: 6 pagesEdition: Vol. 2, 2015, 6 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Helping auditees prepare for an IS/IT audit

by Gelbstein, Ed.

Series: ISACA Journal.Pages: 3 pagesEdition: Vol. 4, 2015, 3 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Auditors and large software projects, part 1 : can auditors prevent project failure?

by Gelbstein, Ed.

Series: ISACA Journal.Pages: 3 pagesEdition: Vol. 5, 2015, 3 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Why computer ethics matters to computer auditing

by Lee, Wanbil W.

Series: ISACA Journal.Pages: 5 pages,Edition: Vol. 2, 2014, 5 pages,. Availability: Copies available for loan: New Zealand (1).
No cover image available
Internal audit's contribution to the effectiveness of information security (part 1)

by Steinbart, Paul John; Raschke, Robyn; Gal, Graham; Dilla, William N.

Series: ISACA Journal.Pages: 6 pages,Edition: Vol. 2, 2014, 6 pages,. Availability: Copies available for loan: New Zealand (1).
No cover image available
Auditing cyberinsurance policy

by Olakunle, Jide.

Series: ISACA Journal.Pages: 4 pages,Edition: Vol. 2, 2014, 4 pages,. Availability: Copies available for loan: New Zealand (1).
No cover image available
The logical reason for consideration of IT

by Singleton, Tommie.

Series: ISACA Journal.Pages: 3 pagesEdition: Vol. 3, 2014, 3 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Ethical hacking : the next level or the game is not over?

by Polic, Viktor.

Series: ISACA Journal.Pages: 3 pagesEdition: vol. 4, 2014, 3 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Beyond the IT in IT audit (part 2) : understanding how to add value to your role

by Singleton, Tommie.

Series: ISACA Journal.Pages: 3 pagesEdition: Vol. 4, 2014, 3 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Manage what is known and what is not known : a road map to managing enterprise fraud risk

by Zhiwei, Fu; Lainhart, John W. Stubbs, Alan.

Series: ISACA Journal.Pages: 10 pagesEdition: Vol. 5, 2014, 10 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
Imperfect technologies and digital hygiene : staying secure in cyberspace

by Gelbstein, Ed.

Series: ISACA Journal.Pages: 5 pagesEdition: Vol. 5, 2014, 5 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
What every IT auditor should know about computer-generated reports

by Singleton, Tommie.

Series: ISACA Journal.Pages: 2 pagesEdition: Vol. 5, 2014, 2 pages. Availability: Copies available for loan: New Zealand (1).
No cover image available
BYOD security considerations of full mobility and third-party cloud computing

by Yu, William Emmanuel.

Series: ISACA Journal.Edition: Volume 1, 2013,Availability: Copies available for loan: New Zealand (1).

© 2017 Chartered Accountants Australia and New Zealand ABN 50 084 642 571 (CA ANZ).
Formed in Australia. Members of CA ANZ are not liable for the debts and liabilities of CA ANZ

Powered by Koha

Powered by Koha