-
2
-
-
84885167699
-
It grc versus? Enterprise grc but: It grc is a basis of strategic governance
-
Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March
-
K. Szenes, "It grc versus? enterprise grc but: It grc is a basis of strategic governance" in Euro- CACS 2010 - Conf. on Computer Audit, Control and Security. Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March 2010
-
(2010)
Euro- CACS 2010 - Conf. on Computer Audit, Control and Security
-
-
Szenes, K.1
-
3
-
-
85193354866
-
Building a corporate risk management methodology and practice
-
Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March
-
"Building a corporate risk management methodology and practice" in EuroCACS 2002 - Conf. for IS Audit, Control and Security. Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March 2002
-
(2002)
EuroCACS 2002 - Conf. for IS Audit, Control and Security
-
-
-
4
-
-
80555158253
-
On the intelligent and secure scheduling of web services in service oriented architectures - Soas
-
Budapest, Hungary November
-
-, "On the intelligent and secure scheduling of web services in service oriented architectures - soas" in Procds. of the 7th International Symposium of Hungarian Researchers on Computational Intelligence, Budapest, Hungary, November 2006, pp. 473-482
-
(2006)
Procds. of the 7th International Symposium of Hungarian Researchers on Computational Intelligence
, pp. 473-482
-
-
-
5
-
-
85193417175
-
It and shareholder return: Creating value in the shareholder industry
-
P. Williams, J. Spangenberg, and S. Kovaleva, "It and shareholder return: Creating value in the shareholder industry" Information Systems Control Journal, Vol. 4, pp. 39-42, 2007
-
(2007)
Information Systems Control Journal
, vol.4
, pp. 39-42
-
-
Williams, P.1
Spangenberg, J.2
Kovaleva, S.3
-
7
-
-
4143071777
-
Legacy system integration technology for legacy application utilization from distributed object environment
-
M. Yoshioka, T. Sodo, A. Yoshikawa, and K. Sakata, "Legacy system integration technology for legacy application utilization from distributed object environment" Hitachi Review, Vol. 47, No. 6, pp. 284-290, 1998 (Pubitemid 128790051)
-
(1998)
Hitachi Review
, vol.47
, Issue.6
, pp. 284-290
-
-
Yoshioka, M.1
Sudo, T.2
Yoshikawa, A.3
Sakata, K.4
-
9
-
-
85193326929
-
-
C. Nelson, J. Miller, W. Farrell, R. Reinitz, and K. Brown, "Implementing a service - oriented architecture version 1.0" 8 2005
-
(2005)
Implementing A Service - Oriented Architecture Version 1.0
, vol.8
-
-
Nelson, C.1
Miller, J.2
Farrell, W.3
Reinitz, R.4
Brown, K.5
-
10
-
-
84886368660
-
Security controls that work
-
D. Melancon, "Security controls that work" IS Control Journal, Vol. 4, 2007
-
(2007)
IS Control Journal
, vol.4
-
-
Melancon, D.1
-
15
-
-
85193410785
-
Important but often dismissed: Internal control in a microsoft access database
-
J. H. White, "Important but often dismissed: Internal control in a microsoft access database" Information Systems Control Journal, Vol. 6, pp. 30-34, 2006
-
(2006)
Information Systems Control Journal
, vol.6
, pp. 30-34
-
-
White, J.H.1
-
16
-
-
33749589061
-
Ajax and record locking
-
October
-
D. Perelman-Hal, "Ajax and record locking" Dr. Dobb's Journal, pp. 45-51, October 2006.
-
(2006)
Dr. Dobb's Journal
, pp. 45-51
-
-
Perelman-Hal, D.1
|