|
|
|
|
| LEADER |
00000cam a2200000 7i4500 |
| 001 |
0000087413 |
| 008 |
141112s2011 nyu eng |
| 020 |
|
|
|a 0071742387
|
| 020 |
|
|
|a 0071742395 (e-book)
|
| 020 |
|
|
|a 9780071742382
|
| 020 |
|
|
|a 9780071742399 (e-book)
|
| 050 |
0 |
0 |
|a QA76.9.A93
|b D38 2011
|
| 090 |
0 |
0 |
|a QA76.9.A93
|b D38 2011
|
| 100 |
1 |
|
|a Davis, Chris
|q (Christopher Michael)
|e author
|
| 245 |
1 |
0 |
|a IT auditing
|b using controls to protect information assets
|h electronic resource
|c Chris Davis, Mike Schiller ; with Kevin Wheeler
|
| 250 |
|
|
|a 2nd ed
|
| 260 |
|
|
|a New York
|b McGraw-Hill
|c c2011
|
| 300 |
|
|
|a 1 online resource (xxix, 480 p.)
|b ill
|
| 650 |
|
0 |
|a Computer networks
|x Security measures
|
| 650 |
|
0 |
|a Computer security
|
| 650 |
|
0 |
|a Electronic data processing
|x Auditing
|
| 650 |
|
0 |
|a Information auditing
|
| 700 |
1 |
|
|a Schiller, Mike
|e author
|
| 700 |
1 |
|
|a Wheeler, Kevin
|e author
|
| 856 |
4 |
0 |
|3 McGraw Hill
|u http://mhebooklibrary.com/doi/book/10.1036/9780071742399
|
| 999 |
|
|
|a 1000163076
|b Electronic Book
|c Electronic Resource
|e Gong Badak Campus
|