First Page | Document Content | |
---|---|---|
![]() Date: 2011-11-18 07:49:16Data security Access control Identity management Separation of duties Password Operating system Information technology controls Information security audit Restricting Access to Databases Security Auditing Computer security | Add to Reading List |