1887

oa Auditing SA - An IT auditor's view of a hacker's methodology and the identification of possible IT audit controls to minimise the threat posed by hacker's

Volume 2005, Issue 22
  • ISSN : 1028-9003

 

Preview this article:
Zoom in
Zoomout

An IT auditor's view of a hacker's methodology and the identification of possible IT audit controls to minimise the threat posed by hacker's, Page 1 of 1

| /docserver/preview/fulltext/audisa/2005/22/180-1.gif

There is no abstract available for this article.
Use the preview function to the left.

Loading full text...

Full text loading...

Loading

Article metrics loading...

/content/audisa/2005/22/AJA10289003_179
2005-06-01
2019-08-24

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error