IT Auditing Using Controls to Protect Information Assets 2/E

Nonfiction, Computers, Application Software, Computer Security
Big bigCover of IT Auditing Using Controls to Protect Information Assets 2/E

More books from McGraw-Hill Companies,Inc.

bigCover of the book CWNA Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide (PW0-104 & PW0-204) by
bigCover of the book Oracle RMAN 11g Backup and Recovery by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 7 - The Measure Phase by
bigCover of the book Reverse Deception Organized Cyber Threat Counter-Exploitation by
bigCover of the book Lean Six Sigma for Supply Chain Management, Chapter 5 - Lean Six Sigma Applications to Materials Requirements Planning (MRPII) by
bigCover of the book Managing Virtual Teams by
bigCover of the book Six Sigma Business Scorecard, Chapter 16 - Integrating the Six Sigma Business Scorecard and Quality Management Systems by
bigCover of the book Easy Spanish Step-By-Step by
bigCover of the book 2-The Problems with Project Management by
bigCover of the book Break Free with DB2 9.7: A Tour of Cost-Slashing New Features by
bigCover of the book CISSP Practice Exams by
bigCover of the book Fix It and Sail by
bigCover of the book 2 Years to a Million in Real Estate by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 12 - Control/Verify Phase by
bigCover of the book Practice Make Perfect French Vocabulary by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy