A. New technology management, B. Information system auditing, governace, internal control and risk management, C. Contingency planning and business continuity, D. Data and information security, E. Fraud, terrorism and infrastructure attacks, H. Networking and internet, L. Security, N. Checklists and guidelines.
展开▼