IT Auditing Using Controls to Protect Information Assets 2/E

Nonfiction, Computers, Application Software, Computer Security
Big bigCover of IT Auditing Using Controls to Protect Information Assets 2/E

More books from McGraw-Hill Companies,Inc.

bigCover of the book Cracking the Sales Management Code: The Secrets to Measuring and Managing Sales Performance (EBOOK) by
bigCover of the book Build Your Own Small Wind Power System by
bigCover of the book Six Sigma Business Scorecard, Chapter 9 - Strategy for Execution by
bigCover of the book Effective Oracle Database 10g Security by Design by
bigCover of the book Web Design Demystified by
bigCover of the book 26 - Theory of Constraints for Education by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 6 - The Define Phase by
bigCover of the book Mike Meyers CompTIA A+ Guide: Essentials Lab Manual, Third Edition (Exam 220-701) by
bigCover of the book Complete Book of Home Inspection 4/E by
bigCover of the book The Innovation Secrets of Steve Jobs: Insanely Different Principles for Breakthrough Success by
bigCover of the book Easy French Step-by-Step by
bigCover of the book Algebra Demystified 2/E by
bigCover of the book Lean Six Sigma for Supply Chain Management, Chapter 8 - Root Cause Analysis Using Six Sigma Tools (With Operations Research Methods) by
bigCover of the book Oracle E-Business Suite Financials Handbook by
bigCover of the book Reverse Deception Organized Cyber Threat Counter-Exploitation by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy