IT Auditing: Using Controls to Protect Information Assets (1st ed.), by Chris Davis, Mike Schiller, and Kevin Wheeler
Adolfo S. Coronado
Journal of Information Privacy and Security, 2014, vol. 10, issue 2, 108-109
Date: 2014
References: Add references at CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2014.924819 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:10:y:2014:i:2:p:108-109
Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20
DOI: 10.1080/15536548.2014.924819
Access Statistics for this article
Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit
More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().