http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
IS Security Matters: IS Security Matters?
Ross, S.J. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.4-5
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part II)
Singleton, T.W. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.6-10
Guest Editorial: Insights From Nature-An Alternate Approach to Information Security
Sayana, S.A. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.15-16
Fraud Analysis Technique Using ACL
Vazzari, D. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.17
Computer Aided Fraud Prevention and Detection-A Step-by-step Guide
Kanhere, V. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.19
Top 10 Security and Privacy Topics for IT Auditors
Rai, S.; Chukwuma, P. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.20-24
Auditing a Security Information Management System
Nayyer, S. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.25-27
Developing an Information Security and Risk Management Strategy
Pironti, J.P. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.28-35
Sivasubramanian, V. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2010 p.36-38