- Documentjopdf0801-auditing-ibm.pdfuploaded byJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMuploaded byJerome B. Agliam
- DocumentRefining IT Processes Using COBITuploaded byJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMuploaded byJerome B. Agliam
- DocumentRefining IT Processes Using COBITuploaded byJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMuploaded byJerome B. Agliam
- DocumentRefining IT Processes Using COBITuploaded byJerome B. Agliam
- DocumentCentralized Security Managementuploaded byJerome B. Agliam
- DocumentEnhancing Security with an IT Network Awareness Center.pdfuploaded byJerome B. Agliam
- DocumentEnhancing Security with an IT Network Awareness Centeruploaded byJerome B. Agliam
- DocumentEnhancing Security with an IT Network Awareness Center.pdfuploaded byJerome B. Agliam
- DocumentChanges to Information Processesuploaded byJerome B. Agliam
- DocumentPrinciples of Governanceuploaded byJerome B. Agliam
- DocumentThe IS Auditor's Consideration of Irregularitiesuploaded byJerome B. Agliam
- DocumentImplementing Enterprise Securityuploaded byJerome B. Agliam
- DocumentIT Governance - Why a Guidelineuploaded byJerome B. Agliam
- DocumentRisk Assessment Tools - A Primeruploaded byJerome B. Agliam
- DocumentImplementing Enterprise Securityuploaded byJerome B. Agliam
- DocumentThe Computer Forensics and Cybersecurity Governance Modeluploaded byJerome B. Agliam
- DocumentSpotlight on Governance.pdfuploaded byJerome B. Agliam
- DocumentSpotlight on Governanceuploaded byJerome B. Agliam
- DocumentUsing CAATs to Support IS Audituploaded byJerome B. Agliam
- DocumentSpotlight on Governance.pdfuploaded byJerome B. Agliam
- DocumentSecurity Architectureuploaded byJerome B. Agliam
- DocumentImpact of SAS No. 94 on Computer Audit Techniquesuploaded byJerome B. Agliam
- DocumentBlack Box Logging and Tertiary Monitoring of Continuous Assurance Systemsuploaded byJerome B. Agliam
- DocumentIT Performance Improvement With COBIT and the SEI CMMuploaded byJerome B. Agliam
- DocumentISACA Standardsuploaded byJerome B. Agliam
- DocumentSimplify and Layer Your Security Approach to Protect Card Datauploaded byJerome B. Agliam
- DocumentInformation Security From a Business Perspective - A Lottery Sector Case Studyuploaded byJerome B. Agliam
- DocumentRecords Retentionuploaded byJerome B. Agliam
- DocumentHacking Exposeduploaded byJerome B. Agliam
- DocumentSensitive Datauploaded byJerome B. Agliam
- DocumentA Young Professional’s Guide to Career Success Using Soft Skillsuploaded byJerome B. Agliam
- DocumentDo governments have the right to compel corporations to divulge information if governments see national (or local) safety at stake?uploaded byJerome B. Agliam
- DocumentAuditing Biometrics-based Authentication Systemsuploaded byJerome B. Agliam
- DocumentRisk Management When Implementing ERP Systemsuploaded byJerome B. Agliam
- DocumentThe Relevance of IT in Criminal Investigationsuploaded byJerome B. Agliam
- DocumentFederation of E-governmentuploaded byJerome B. Agliam
- DocumentSecurity and Privacy vs. Computer Forensics Capabilitiesuploaded byJerome B. Agliam
- DocumentWho Audits Auditorsuploaded byJerome B. Agliam
- DocumentJopdf0705 Turning a Securityuploaded byJerome B. Agliam
- DocumentOne of Today’s Most Overlooked Security Threats—Six Ways Auditors Can Fight Ituploaded byJerome B. Agliam
- DocumentPrivacy PKIuploaded byJerome B. Agliam
- DocumentExecutive and Board Roles in Information Securityuploaded byJerome B. Agliam
- DocumentIS Auditing Standards in Malaysiauploaded byJerome B. Agliam
- DocumentData Warehouse Audits Promote and Sustain Reporting System Valueuploaded byJerome B. Agliam
- DocumentSAS70 Reportsuploaded byJerome B. Agliam
- DocumenteBusiness Trust Inhibitorsuploaded byJerome B. Agliam