• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Integrity, Internal Control and Security in Information Systems :

پدید آورنده
edited by Michael Gertz, Erik Guldentops, Leon Strous.

موضوع
Computer science.,Information Systems.,Information theory.

رده
T58
.
64
E358
2002

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0387355839
(Number (ISBN
1475755376
(Number (ISBN
9780387355832
(Number (ISBN
9781475755374

NATIONAL BIBLIOGRAPHY NUMBER

Number
b538684

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Integrity, Internal Control and Security in Information Systems :
General Material Designation
[Book]
Other Title Information
Connecting Governance and Technology
First Statement of Responsibility
edited by Michael Gertz, Erik Guldentops, Leon Strous.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boston, MA
Name of Publisher, Distributor, etc.
Springer US : Imprint : Springer
Date of Publication, Distribution, etc.
2002

SERIES

Series Title
IFIP - The International Federation for Information Processing, 83.

CONTENTS NOTE

Text of Note
One. Refereed papers --;1. A cautionary note regarding the data integrity capacity of certain secure systems --;2. Developing secure software: A survey and classification of common software vulnerabilities --;3. Establishing accounting principles as invariants of financial systems --;4. Integrity and internal control in modern banking systems --;5. Diversity as a defense strategy in information systems: Does evidence from previous events support such an approach? --;two. Invited papers --;6. Data quality: developments and directions --;7. Developments in electronic payment systems security: EMV and CEPS --;three. Tutorial 'CobiT and IT Governance' --;8. Governing information technology through CobiT --;9. Implementation of the COBIT-3 maturity model in Royal Philips Electronics --;four. Vendor white papers --;10. Business process security: Managing the new security challenge with X-Tra Secure --;11. The information integrity imperative --;five. Panel session --;12. The way forward --;Index of contributors --;Index of keywords.

SUMMARY OR ABSTRACT

Text of Note
The goals for this international working conference are to find answers to the following questions: * what precisely do business managers need in order to have confidence in the integrity of their information systems and their data;

TOPICAL NAME USED AS SUBJECT

Computer science.
Information Systems.
Information theory.

LIBRARY OF CONGRESS CLASSIFICATION

Class number
T58
.
64
Book number
E358
2002

PERSONAL NAME - PRIMARY RESPONSIBILITY

edited by Michael Gertz, Erik Guldentops, Leon Strous.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Erik Guldentops
Leon Strous
Michael Gertz

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival