Your search returned 14 results. Subscribe to this search

|
1. Cognitive Hack : The New Battleground in Cybersecurity ... the Human Mind.

by Bone, James.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37.B664 2017.
2. The CISO Journey : Life Lessons and Concepts to Accelerate Your Professional Development.

by Fredriksen, Eugene M.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : CRC Press, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5548.37.F743 2017.
3. Implementing Cybersecurity : A Guide to the National Institute of Standards and Technology Risk Management Framework.

by Kohnke, Anne | Sigler, Ken | Shoemaker, Dan.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.K646 2017.
4. Data Analytics for Internal Auditors.

by Cascarino, Richard E.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5668.C37 2017.
5. Securing an IT Organization through Governance, Risk Management, and Audit.

by Sigler, Ken E | Rainey, III, James L.

Material type: Text Text; Format: electronic available online remote Publisher: Boca Raton : CRC Press, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online T58.5.
6. A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) : A Guide to the National Initiative for Cybersecurity Education (NICE) Framework (2.0)

by Shoemaker, Dan | Kohnke, Anne | Sigler, Ken.

Material type: Text Text; Format: electronic available online remote Publisher: Portland : CRC Press, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 -- .S564 2016.
7. The Complete Guide to Cybersecurity Risks and Controls.

by Kohnke, Anne | Shoemaker, Dan | Sigler, Ken E.

Material type: Text Text; Format: electronic available online remote Publisher: Boca Raton : CRC Press, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 -- .K6346 2016.
8. Operational Assessment of IT.

by Katzman, Steve.

Material type: Text Text; Format: electronic available online remote Publisher: Boca Raton : CRC Press, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD30.2 -- .K3857 2016.
9. Mastering the Five Tiers of Audit Competency : The Essence of Effective Auditing

by Butera, Ann.

Material type: Text Text; Format: electronic available online remote Publisher: Boca Raton : CRC Press, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5668.25 -- .B884 2016.
10. Corporate Defense and the Value Preservation Imperative : Bulletproof Your Corporate Defense Program.

by Lyons, Sean.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : CRC Press, 2016Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD59.2.L966 2017.
11. Operational Auditing : Principles and Techniques for a Changing World.

by Murdock, Hernan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5668.25.M873 2017.
12. Internal Audit Practice from A to Z.

by Nzechukwu, Patrick Onwura.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5668.25.N943 2017.
13. Security and Auditing of Smart Devices : Managing Proliferation of Confidential Data on Corporate and BYOD Devices.

by Rai, Sajay | Chukwuma, Philip | Cozart, Richard.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59.R35 2017.
14. Leading the Internal Audit Function.

by Fountain, Lynn.

Material type: Text Text; Format: electronic available online remote Publisher: New York : CRC Press, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HF5668.25.F68 2016.