


default search action
3. IICIS 1999: Amsterdam, The Netherlands
- Margaret E. van Biene-Hershey, Leon Strous:
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999. IFIP Conference Proceedings 165, Kluwer 1999, ISBN 0-7923-7821-0 - Fayezul H. Choudhury, Philip Mitchell:
COSO in the Worldbank. IICIS 1999: 1-10 - Robert Melville, Michael Hafen:
Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center. IICIS 1999: 11-22 - Vijay V. Mandke, Madhavan K. Nayar:
Implementing Information Integrity Technology - A Feedback Control System Approach. IICIS 1999: 23-40 - Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards:
Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM). IICIS 1999: 41-58 - Paul Ammann, Sushil Jajodia:
The Integrity Challenge. IICIS 1999: 59-70 - Wouter J. Keller, Roel G. J. Rot:
Integrity and Internal Control in a Statistical Environment. IICIS 1999: 71-84 - Paloma Díaz, Ignacio Aedo, Fivos Panetsos:
Definition of Integrity Policies For Web-based Applications. IICIS 1999: 85-98 - Patrizia Asirelli, Fabrizio Fabbrini:
Firewall Policies Definition Tools: An Implementation Idea. IICIS 1999: 99-110 - Martin Stanek, Daniel Olejár:
Integrity Testing in WWW Environment. IICIS 1999: 111-120 - Piet J. M. Poos:
Complex IT Environments: Ascertaining Information Integrity. IICIS 1999: 121-146 - Lars Frank:
Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties. IICIS 1999: 147-158 - Christina Yip Chung, Michael Gertz, Karl N. Levitt:
DEMIDS: A Misuse Detection System for Database Systems. IICIS 1999: 159-178 - Joan L. Aron, Ronald A. Gove:
Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update. IICIS 1999: 179-184

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.