Preface. Acknowledgements. 1. COSO in the Worldbank; F.H. Choudhury, P. Mitchell. 2. Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center; R. Melville, M. Hafen. 3. Implementing Information Integrity Technology - A Feedback Control System Approach; V.V. Mandke, M.K. Nayar. 4. Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM); K. Rajalingham, et al. 5. The Integrity Challenge; P. Ammann, S. Jajodia. 6. Integrity and Internal Control in a Statistical Environment; W.J. Keller, R.G.J. Rot. 7. Definition of Integrity Policies for Web-based Applications; P. Díaz, et al. 8. Firewall Policies Definition Tools: An Implementation Idea; P. Asirelli, F. Fabbrini. 9. Integrity Testing in WWW Environment; M. Stanek, D. Olejár. 10. Complex IT Environments: Ascertaining Information Integrity; P.J.M. Poos. 11. Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties; L. Frank. 12. DEMIDS: A Misuse Detection System for Database Systems; C.Y. Chung, et al. 13. Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update; J.L. Aron, R.A. Gove. Index of Contributors. Index of Keywords.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.