메뉴 건너뛰기




Volumn 6, Issue 1, 2012, Pages 27-37

Supporting applications development and operation using it security and audit measures

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84885130511     PISSN: 18977979     EISSN: 20844840     Source Type: Journal    
DOI: 10.5277/e-Inf120102     Document Type: Article
Times cited : (2)

References (16)
  • 2
    • 84885167699 scopus 로고    scopus 로고
    • It grc versus? Enterprise grc but: It grc is a basis of strategic governance
    • Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March
    • K. Szenes, "It grc versus? enterprise grc but: It grc is a basis of strategic governance" in Euro- CACS 2010 - Conf. on Computer Audit, Control and Security. Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March 2010
    • (2010) Euro- CACS 2010 - Conf. on Computer Audit, Control and Security
    • Szenes, K.1
  • 3
    • 85193354866 scopus 로고    scopus 로고
    • Building a corporate risk management methodology and practice
    • Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March
    • "Building a corporate risk management methodology and practice" in EuroCACS 2002 - Conf. for IS Audit, Control and Security. Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March 2002
    • (2002) EuroCACS 2002 - Conf. for IS Audit, Control and Security
  • 4
    • 80555158253 scopus 로고    scopus 로고
    • On the intelligent and secure scheduling of web services in service oriented architectures - Soas
    • Budapest, Hungary November
    • -, "On the intelligent and secure scheduling of web services in service oriented architectures - soas" in Procds. of the 7th International Symposium of Hungarian Researchers on Computational Intelligence, Budapest, Hungary, November 2006, pp. 473-482
    • (2006) Procds. of the 7th International Symposium of Hungarian Researchers on Computational Intelligence , pp. 473-482
  • 7
    • 4143071777 scopus 로고    scopus 로고
    • Legacy system integration technology for legacy application utilization from distributed object environment
    • M. Yoshioka, T. Sodo, A. Yoshikawa, and K. Sakata, "Legacy system integration technology for legacy application utilization from distributed object environment" Hitachi Review, Vol. 47, No. 6, pp. 284-290, 1998 (Pubitemid 128790051)
    • (1998) Hitachi Review , vol.47 , Issue.6 , pp. 284-290
    • Yoshioka, M.1    Sudo, T.2    Yoshikawa, A.3    Sakata, K.4
  • 10
    • 84886368660 scopus 로고    scopus 로고
    • Security controls that work
    • D. Melancon, "Security controls that work" IS Control Journal, Vol. 4, 2007
    • (2007) IS Control Journal , vol.4
    • Melancon, D.1
  • 15
    • 85193410785 scopus 로고    scopus 로고
    • Important but often dismissed: Internal control in a microsoft access database
    • J. H. White, "Important but often dismissed: Internal control in a microsoft access database" Information Systems Control Journal, Vol. 6, pp. 30-34, 2006
    • (2006) Information Systems Control Journal , vol.6 , pp. 30-34
    • White, J.H.1
  • 16
    • 33749589061 scopus 로고    scopus 로고
    • Ajax and record locking
    • October
    • D. Perelman-Hal, "Ajax and record locking" Dr. Dobb's Journal, pp. 45-51, October 2006.
    • (2006) Dr. Dobb's Journal , pp. 45-51
    • Perelman-Hal, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.