0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (6)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and... Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19-20, 1998 (Hardcover, 1998 ed.)
Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous
R5,750 Discovery Miles 57 500 Ships in 10 - 15 working days

Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is the status quo of research and development in this area? Where are the gaps between business needs on the one hand and research/development on the other; what needs to be done to bridge these gaps? Integrity and Internal Control in Information Systems contains the selected proceedings of the Second Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Warrenton, Virginia, USA, in November 1998. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and edp-auditing.

Integrity and Internal Control in Information Systems - Strategic Views on the Need for Control (Hardcover, 2000 ed.): Margaret... Integrity and Internal Control in Information Systems - Strategic Views on the Need for Control (Hardcover, 2000 ed.)
Margaret E. van Biene-Hershey, Leon A. M. Strous
R4,462 Discovery Miles 44 620 Ships in 10 - 15 working days

This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: * To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; * To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; * To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.

Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.):... Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.)
Michael Gertz, Erik Guldentops, Leon A. M. Strous
R2,996 Discovery Miles 29 960 Ships in 10 - 15 working days

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: * what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; * what is the status quo of research and development in this area; * where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: * Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. * Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. * Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

Integrity and Internal Control in Information Systems - Volume 1: Increasing the confidence in information systems (Hardcover,... Integrity and Internal Control in Information Systems - Volume 1: Increasing the confidence in information systems (Hardcover, 1997 ed.)
Sushil Jajodia, Graeme W. McGregor, William List, Leon A. M. Strous
R4,566 Discovery Miles 45 660 Ships in 10 - 15 working days

Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you will not only find the papers that have been presented during the first working conference dedicated to the subject (section A) but also some of the papers that have formed the basis for the current activities of this working group (section B). Finally some information about IFIP TC-ll and its working groups is included (section C). This first working conference is the start for an ongoing dialog between the information security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future."

Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Paperback, 2002 ed.):... Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Paperback, 2002 ed.)
Michael Gertz, Erik Guldentops, Leon A. M. Strous
R2,851 Discovery Miles 28 510 Ships in 10 - 15 working days

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: * what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; * what is the status quo of research and development in this area; * where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: * Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. * Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. * Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

Integrity and Internal Control in Information Systems - Strategic Views on the Need for Control (Paperback, Softcover reprint... Integrity and Internal Control in Information Systems - Strategic Views on the Need for Control (Paperback, Softcover reprint of the original 1st ed. 2000)
Margaret E. van Biene-Hershey, Leon A. M. Strous
R4,321 Discovery Miles 43 210 Ships in 10 - 15 working days

This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: * To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; * To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; * To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.

Integrity and Internal Control in Information Systems - Volume 1: Increasing the confidence in information systems (Paperback,... Integrity and Internal Control in Information Systems - Volume 1: Increasing the confidence in information systems (Paperback, Softcover reprint of the original 1st ed. 1997)
Sushil Jajodia, Graeme W. McGregor, William List, Leon A. M. Strous
R4,373 Discovery Miles 43 730 Ships in 10 - 15 working days

Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you will not only find the papers that have been presented during the first working conference dedicated to the subject (section A) but also some of the papers that have formed the basis for the current activities of this working group (section B). Finally some information about IFIP TC-ll and its working groups is included (section C). This first working conference is the start for an ongoing dialog between the information security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future.

Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and... Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19-20, 1998 (Paperback, Softcover reprint of the original 1st ed. 1998)
Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous
R6,047 Discovery Miles 60 470 Ships in 10 - 15 working days

Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is the status quo of research and development in this area? Where are the gaps between business needs on the one hand and research/development on the other; what needs to be done to bridge these gaps? Integrity and Internal Control in Information Systems contains the selected proceedings of the Second Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Warrenton, Virginia, USA, in November 1998. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and edp-auditing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cuito Cuanavale - 12 Months Of War That…
Fred Bridgland Paperback  (4)
R320 R286 Discovery Miles 2 860
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R290 Discovery Miles 2 900
Rebels And Rage - Reflecting On…
Adam Habib Paperback R325 Discovery Miles 3 250
A History of the British Freshwater…
Arthur Hill Hassall Paperback R677 Discovery Miles 6 770
Motigraphics - The Analysis and…
Richard C. Maddock Hardcover R2,814 Discovery Miles 28 140
The Legacy of Bruce Yandle
Donald J. Boudreaux, Roger Meiners Hardcover R765 R681 Discovery Miles 6 810
Between Two Fires - Holding The Liberal…
John Kane-Berman Paperback  (3)
R372 Discovery Miles 3 720
Phytoremediation - Biotechnological…
Rouf Ahmad Bhat, Fernanda Maria Polic Tonelli, … Paperback R4,253 Discovery Miles 42 530
Strategic Deals in Emerging Capital…
Irina Ivashkovskaya, Svetlana Grigorieva, … Hardcover R4,623 Discovery Miles 46 230
Religion and Trade - Cross-Cultural…
Francesca Trivellato, Leor Halevi, … Hardcover R4,080 Discovery Miles 40 800

 

Partners