IT auditing : using controls to protect information assets
Material type: TextPublication details: Chennai McGraw Hill 2011Edition: 2nd edDescription: 480pISBN:- 9780071077279
- 005.8 DAV/I
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
Reference | IIIT Kottayam Central Library Reference | 005.8 DAV/I (Browse shelf(Opens below)) | Not For Loan | 2484 | ||||
Books | IIIT Kottayam Central Library General Stacks | 005.8 DAV/I (Browse shelf(Opens below)) | 1 | Available | 2485 | |||
Books | IIIT Kottayam Central Library General Stacks | 005.8 DAV/I (Browse shelf(Opens below)) | 2 | Available | 2486 |
Total holds: 0
Browsing IIIT Kottayam Central Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
005.8 COE/E Expert Fraud Investigation : A Step-by-Step Guide | 005.8 COE/E Expert Fraud Investigation : A Step-by-Step Guide | 005.8 COX/D Digital watermarking and steganography / | 005.8 DAV/I IT auditing : using controls to protect information assets | 005.8 DAV/I IT auditing : using controls to protect information assets | 005.8 EAS/S System Forensics, Investigation, and Response | 005.8 EAS/S System Forensics, Investigation, and Response |
There are no comments on this title.
Log in to your account to post a comment.