-
1
-
-
80051798975
-
-
AICPA URL: American Institute of Certified Public Accountants
-
AICPA Generally accepted Auditing Standards. SAS 95 URL: 2001 American Institute of Certified Public Accountants http://www.aicpa.org/download/members/ div/auditstd/AU-00150.PDF
-
(2001)
Generally Accepted Auditing Standards. SAS 95
-
-
-
3
-
-
77952903083
-
-
Verizon Business
-
W.H. Baker, A. Hutton, C.D. Hylender, C. Novak, C. Porter, and B. Sartin 2009 data breach investigations report 2009 Verizon Business
-
(2009)
2009 Data Breach Investigations Report
-
-
Baker, W.H.1
Hutton, A.2
Hylender, C.D.3
Novak, C.4
Porter, C.5
Sartin, B.6
-
8
-
-
80051794334
-
-
ISACA
-
P.R. Bitterli, J. Brun, T. Bucher, B. Christ, B. Hamberger, and M. Huissoud Guide to the audit of IT applications 2009 ISACA
-
(2009)
Guide to the Audit of IT Applications
-
-
Bitterli, P.R.1
Brun, J.2
Bucher, T.3
Christ, B.4
Hamberger, B.5
Huissoud, M.6
-
16
-
-
80051792144
-
-
Congress of the United States of America. Sarbanes-Oxley Act of 2002, H.R. 3763
-
Congress of the United States of America. Sarbanes-Oxley Act of 2002, H.R. 3763.
-
-
-
-
21
-
-
44649173066
-
Security Lessons Learned from Société Géné rale
-
J. Epstein Security Lessons Learned from Société Générale IEEE Security & Privacy 6 3 2008
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.3
-
-
Epstein, J.1
-
34
-
-
33747047446
-
-
10th ed. John Wiley & Sons
-
D.S. Kidwell, D.W. Blackwell, D.A. Whidbee, and R.L. Peterson Financial institutions, markets, and money 10th ed. 2008 John Wiley & Sons
-
(2008)
Financial Institutions, Markets, and Money
-
-
Kidwell, D.S.1
Blackwell, D.W.2
Whidbee, D.A.3
Peterson, R.L.4
-
37
-
-
3042645113
-
-
Microsoft Press
-
J.D. Meier, A. Mackman, M. Dunner, and S. Vasireddy Building secure Microsoft ASP.NET applications: authentication, authorization, and secure communication 2003 Microsoft Press
-
(2003)
Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication
-
-
Meier, J.D.1
MacKman, A.2
Dunner, M.3
Vasireddy, S.4
-
39
-
-
80051795014
-
Principles and applications of cryptographic key management
-
H.F. Tipton, M. Krause, 6th ed. Auerbach
-
W.H. Murray Principles and applications of cryptographic key management H.F. Tipton, M. Krause, Information security management handbook 6th ed. 2007 Auerbach
-
(2007)
Information Security Management Handbook
-
-
Murray, W.H.1
-
40
-
-
0003969633
-
-
NIST Department of Defense, National Security Institute
-
NIST Trusted computer system evaluation criteria 1983 Department of Defense, National Security Institute
-
(1983)
Trusted Computer System Evaluation Criteria
-
-
-
42
-
-
79952035383
-
-
OAuth Core Workgoup URL
-
OAuth Core Workgoup OAuth core 1.0 Revision A URL: http://oauth.net/core/ 1.0a June 2009
-
(2009)
OAuth Core 1.0 Revision A
-
-
-
45
-
-
24944551836
-
Recommended security controls for federal information systems
-
National Institute of Standards and Technology
-
R. Ross, S. Katzke, A. Johnson, M. Swanson, G. Stoneburner, and G. Rogers Recommended security controls for federal information systems Special Publication 800-53, Rev. 2 Dec. 2007 National Institute of Standards and Technology
-
(2007)
Special Publication 800-53, Rev.
, vol.2
-
-
Ross, R.1
Katzke, S.2
Johnson, A.3
Swanson, M.4
Stoneburner, G.5
Rogers, G.6
-
47
-
-
0016555241
-
The protection of information in computer systems
-
J.H. Saltzer, and M.D. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 1975 1278 1308
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
|