Topic: IT Governance

Documents

Format: Report
Titlesort descending Rating Total views
Cover: 2013 CYBER-CRIME , HACKING AND MALWARE Report 2013 CYBER-CRIME , HACKING AND MALWARE Report
Year of Publication: 2013
Author(s): IDG Connect
0
625
Cover: CoGTA circular on the CGICTPF CoGTA circular on the CGICTPF
Year of Publication: 2014
Name of Organisation: CoGTA
0
519
Format: Guidelines
Titlesort descending Rating Total views
Cover: 3 Steps to Launching a Successful Bring Your Own Device Strategy 3 Steps to Launching a Successful Bring Your Own Device Strategy
Year of Publication: 2012
Author(s): Cortado
0
503
Cover: Best Practices and Applications of TLS/SSL Best Practices and Applications of TLS/SSL
Year of Publication: 2012
Author(s): Larry Seltzer
0
446
Cover: Best Practices for Protecting Laptop Data Best Practices for Protecting Laptop Data
Year of Publication: 2012
Author(s): eVault
1
451
Cover: Bring Your Own Device - A Concept with ROI Potential Bring Your Own Device - A Concept with ROI Potential
Year of Publication: 2012
Author(s): Cortado
0
627
Cover: COBIT 5:  Framework COBIT 5: Framework
Year of Publication: 2011
Author(s): ISACA
4
1,396
Format: Strategy/Programme
Titlesort descending Rating Total views
Cover: 3 Steps to Launching a Successful Bring Your Own Device Strategy 3 Steps to Launching a Successful Bring Your Own Device Strategy
Year of Publication: 2012
Author(s): Cortado
0
503
Cover: Bring Your Own Device - A Concept with ROI Potential Bring Your Own Device - A Concept with ROI Potential
Year of Publication: 2012
Author(s): Cortado
0
627
Format: Practical Knowledge
Titlesort descending Rating Total views
Cover: 3 Steps to Launching a Successful Bring Your Own Device Strategy 3 Steps to Launching a Successful Bring Your Own Device Strategy
Year of Publication: 2012
Author(s): Cortado
0
503
Cover: Best Practices and Applications of TLS/SSL Best Practices and Applications of TLS/SSL
Year of Publication: 2012
Author(s): Larry Seltzer
0
446
Cover: Bring Your Own Device - A Concept with ROI Potential Bring Your Own Device - A Concept with ROI Potential
Year of Publication: 2012
Author(s): Cortado
0
627
Format: Case Study
Titlesort descending Rating Total views
Cover: Best Practices for Protecting Laptop Data Best Practices for Protecting Laptop Data
Year of Publication: 2012
Author(s): eVault
1
451
Format: Presentation
Titlesort descending Rating Total views
Cover: Better, Faster, Cheaper: A Framework for Operational Efficiency Better, Faster, Cheaper: A Framework for Operational Efficiency
Year of Publication: 2012
Name of Organisation: SAP
0
554
Format: Policy
Titlesort descending Rating Total views
Cover: Camdeboo Municipality Proposed Policy Additions Camdeboo Municipality Proposed Policy Additions
Year of Publication: 2011
Author(s): Christopher Nash
Name of Organisation: Camdeboo Municipality
3
1,402
Cover: Change Control Policy & Form Change Control Policy & Form
Year of Publication: 2012
Author(s): tanoISP
Editor(s): Tanya Bippert
4
876
Format: Overview
Titlesort descending Rating Total views
Cover: Cobit 5 Readiness Cobit 5 Readiness
Year of Publication: 2011
Name of Organisation: IT Governance Network
0
890
Cover: CobiT ® 5 IT Governance Framework CobiT ® 5 IT Governance Framework
Year of Publication: 2011
Name of Organisation: IT Governance Network
0
1,817
Format: Theoretical Knowledge
Titlesort descending Rating Total views
Cover: COBIT 5:  Framework COBIT 5: Framework
Year of Publication: 2011
Author(s): ISACA
4
1,396
Format: Response
Titlesort descending Rating Total views
Cover: CoGTA circular on the CGICTPF CoGTA circular on the CGICTPF
Year of Publication: 2014
Name of Organisation: CoGTA
0
519

Pages