18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES<br />

Al Marcella (2006) IT Audit Practices, ISACA Training Week - Budapest, Training support<br />

materials<br />

Bill Bruck (2003) Taming the Information Tsunami – 2 nd edition, Microsoft Press<br />

Charles Le Grand and Dan Sarel (2008) “Database Security, Compliance and Audit”,<br />

Information Systems Control Journal, vol. 5: 27-31<br />

Christopher Reed (2010) “Achieving Data Warehouse Nirvana – The Critical Role of<br />

Information Control”, Information Systems Control Journal, vol. 4: 31-34<br />

Information Systems Audit and Control Association (2006) CISA Review Manual, USA,<br />

IT Governance Institute (2007) COBIT 4.1, USA<br />

Information Systems Audit and Control Associations (2009) Security, Audit and Control<br />

Features Oracle Database 3 rd Edition, USA,<br />

Jeffrey T. Hare (2008) “Monitoring Privileged Application Users in Oracle Applications<br />

Environment”, Information Systems Control Journal, vol. 6: 46-50<br />

John H. White (2006) “Important, But Often Dismissed: Internal Control in a Microsoft<br />

Access Database”, Information Systems Control Journal, vol. 6: 30-34<br />

Mike Pinch (2009) “Database Activity Monitoring: An Emerging Technology for Audit and<br />

Compliance”, Information Systems Control Journal, vol. 1: 44-47<br />

Mukul Pareek (2006) “Living with Risk”, Information Systems Control Journal, vol. 6: 35-38<br />

Nancy Bagranoff, Mark Simkin, Carolyn Norman (2008) Core Concepts of Accounting<br />

Information Systems, John Wiley & Sons, INC, USA<br />

Nastase Pavel, Lunceanu - Unchiasu Simona Felicia (2010) “IT Governance Maturity level<br />

for the Romanian companies”, 11 th World Congress of Accounting Educators and<br />

Researchers – Conference volume, Singapore<br />

Nastase Pavel and etc. (2007) Auditul si Controlul Sistemelor Informationale, Editura<br />

Economica<br />

Paul J. Sobel (2007) Auditor’s Risk Management Guide: Integrating Auditing and ERM, CCH<br />

Learning Center, USA<br />

Ponemon Institute (2010) 2009 US Cost of a Data Breach Study, available on-line at<br />

www.encryptionreports.com<br />

Robert Dollinger, Luciana Andron (2005) Baze de date si gestiunea tranzactiilor”, Editura<br />

Albastra<br />

S. Anantha Sayana (2003) “Auditing OS and Database Controls”, Information Systems<br />

Control Journal, Vol. 3, available on-line at www.isaca.org<br />

Steve Rimell (2007) Advanced IT Audit School, IT Audit School training material, Athens<br />

Verizon Risk Team (2010) 2010 Data Breach Investigation Report, available on-line at<br />

www.verizonbusiness.com<br />

~ 301 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!