IT Auditing Using Controls to Protect Information Assets 2/E

Nonfiction, Computers, Application Software, Computer Security
Big bigCover of IT Auditing Using Controls to Protect Information Assets 2/E

More books from McGraw-Hill Companies,Inc.

bigCover of the book Security Information and Event Management (SIEM) Implementation by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 4 - Maximizing Resources by
bigCover of the book Zend Framework, A Beginner's Guide by
bigCover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 12 - The Taguchi Method by
bigCover of the book Break Free with DB2 9.7: A Tour of Cost-Slashing New Features by
bigCover of the book Excel 2007 VBA Macro Programming by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 5 - Project Management Using DMAIC and DMADV by
bigCover of the book Quick Start Guide to Oracle Fusion Development: Oracle JDeveloper and Oracle ADF by
bigCover of the book Mike Meyers' CompTIA A+ Guide: Practical Application, Third Edition (Exam 220-702) by
bigCover of the book Oracle Essbase & Oracle OLAP by
bigCover of the book Anatomy Demystified by
bigCover of the book Data Modeling, A Beginner's Guide by
bigCover of the book Crush Price Objections: Sales Tactics for Holding Your Ground and Protecting Your Profit by
bigCover of the book The Six Sigma Handbook, Third Edition, Chapter 10 - Analyze Phase by
bigCover of the book JavaFX A Beginners Guide by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy