遗忘 发表于 2025-3-25 04:43:47

Business Process Securitythreats from hackers and virus authors, the real security challenge is much closer to home. If security professionals want to avoid falling into the trap of trying to protect everything all the time, they need to refocus their defenses on authorized users and the resources they have access to.

FLIT 发表于 2025-3-25 10:55:30

http://reply.papertrans.cn/47/4692/469173/469173_22.png

NATAL 发表于 2025-3-25 14:57:06

978-1-4757-5537-4IFIP International Federation for Information Processing 2002

FORGO 发表于 2025-3-25 17:21:37

http://reply.papertrans.cn/47/4692/469173/469173_24.png

forbid 发表于 2025-3-25 23:23:35

http://reply.papertrans.cn/47/4692/469173/469173_25.png

badinage 发表于 2025-3-26 02:51:59

http://reply.papertrans.cn/47/4692/469173/469173_26.png

种属关系 发表于 2025-3-26 06:58:50

The Information Integrity ImperativeThis white paper examines several dimensions of information integrity. It then explains why it is so imperative that we mobilize appropriate resources to create and implement a new, universal framework for achieving information integrity.

Apraxia 发表于 2025-3-26 12:15:22

http://reply.papertrans.cn/47/4692/469173/469173_28.png

争论 发表于 2025-3-26 16:16:54

Data Quality: Developments and DirectionsMITRE Corporation to use annotations to manage data quality. Next some of the emerging directions in data quality including managing quality for the semantic web and the relationships between data quality and data mining will be discussed. Finally some of the directions for data quality will be provided.

连词 发表于 2025-3-26 17:11:18

http://reply.papertrans.cn/47/4692/469173/469173_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Integrity, Internal Control and Security in Information Systems; Connecting Governanc Michael Gertz,Erik Guldentops,Leon Strous Book 2002 I