:05:puterFraud:AnIn-:978-1-4200-8784-hBrancikBuildinganEffectiveInformationISBN:978-1-4200-4659-5SecurityPolicyArchitectureSandyBacikITAuditingandSarbanes-OxleyISBN:978-1-4200-5905-2Compliance:KeyStrategiesforCISOSoftSkills:anizationsBusinessImprovementImpairedbyEmployeePolitics,Apathy,:978-1-4200-8617-1RonCollette,MichaelGentileandSkyeGentileISBN:978-1-4200-8910-3MaliciousBots:AnInsideLookintotheCyber-CriminalUndergroundCriticalInfrastructure:ponentParts,Vulnerabilities,OperatingKenDunhamandJimMelnickRisks,andInterdependenciesISBN:978-1-4200-6903-7TysonMacaulayISBN:978-1-4200-6835-1MechanicsofUserIdentificationandAuthentication:FundamentalsCyberForensics:AFieldManualforofIdentityManagementCollecting,Examining,puterCrimes,SecondISBN:978-1-4200-5219-0EditionAlbertMarcella,:978-0-8493-8328-1OracleIdentityManagement:Governance,Risk,plianceDigitalPrivacy:Theory,Technologies,Architecture,,StefanosGritzalis,CostosLam-ISBN:978-1-4200-7247-1brinoudakisandSabrinadiVimercatiISBN:978-1-4200-5217-6ProfilingHackers:TheScienceofCriminalProfilingasAppliedtotheHowtoAchieve27001Certification::978-1-4200-8693-5ISBN:978-0-8493-3648-:978-1-4200-9229-5ISBN:978-1-4200-6275-5SecuritySoftwareDevelopment::978-0-8493-8067-9ISBN:978-1-4200-6380-6InformationSecurityManagementHandbook,SoftwareDeployment,Updating,,EditorsISBN:978-0-8493-5800-5ISBN:978-0-8493-7495-1InformationTechnologyControlandAudit,Under
Auerbach - Information Technology Control and Audit - 3rd Edition - Nov 2008 来自淘豆网www.taodocs.com转载请标明出处.