IT Auditing Using Controls to Protect Information Assets 2/E

Nonfiction, Computers, Application Software, Computer Security
Big bigCover of IT Auditing Using Controls to Protect Information Assets 2/E

More books from McGraw-Hill Companies,Inc.

bigCover of the book Oracle CRM On Demand Combined Analyses by
bigCover of the book 26 - Theory of Constraints for Education by
bigCover of the book Six Sigma Statistics with Excel: Statistical Process Control by
bigCover of the book Mike Meyers' CompTIA A+ Guide: Practical Application, Third Edition (Exam 220-702) by
bigCover of the book The Canadian Guide to Will and Estate Planning: Everything You Need to Know Today to Protect Your Wealth and Your Family Tomorrow 3E by
bigCover of the book 15 Dangerously Mad Projects for the Evil Genius by
bigCover of the book Reverse Deception Organized Cyber Threat Counter-Exploitation by
bigCover of the book Chemistry Demystified 2/E by
bigCover of the book Living Aboard Your RV, 4th Edition by
bigCover of the book Algebra Demystified 2/E by
bigCover of the book Business Math Demystified by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 10 - Analyze Phase by
bigCover of the book Security Information and Event Management (SIEM) Implementation by
bigCover of the book Lean Six Sigma for Supply Chain Management, Chapter 4 - Lead-Time Impact on Lean Six Sigma Projects by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 12 - Control/Verify Phase by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy