An evolving agenda of Information Technology Auditing is subject of this book. The author presents various current and future ...
اقرأ المزيد
The "Internal Audit Handbook" is a comprehensive, up-to-date presentation of the tasks and challenges facing internal audit. ...
اقرأ المزيد
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
اقرأ المزيد
This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
اقرأ المزيد
“Joel Demski’s book is an excellent book in accounting that provides an insightful and comprehensive study on managerial ...
اقرأ المزيد
A major handbook of planning and design data for architects and architecture students. Covering basic design data for all ...
اقرأ المزيدThe International Symposium on Hearing is a prestigious,triennial gathering where world-class scientists present and discuss ...
اقرأ المزيد
Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...
اقرأ المزيد
Provides a care-fully balanced presentation of auditing theory and practice. The approach is to integrate auditing material ...
اقرأ المزيد
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
اقرأ المزيدProcess Control Performance Assessment is a practical guide to the application of control benchmarking to real, complex, ...
اقرأ المزيد
Provides a concise overview of the current context and types of public sector audit and the varied structures within which ...
اقرأ المزيد
This book provides a concise yet comprehensive overview on how to build a quality management program for hematopoietic stem ...
اقرأ المزيد
Over the last 11 years, ECDL has created a strong interdisciplinary com- nity of researchers and practitioners in the ?eld ...
اقرأ المزيد
It will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...
اقرأ المزيد
Soft computing techniques are widely used in most businesses. This book consists of several important papers on the applications ...
اقرأ المزيد
This book discusses firm valuation, which is of interest to economists, particularly those working in finance. Firm valuation ...
اقرأ المزيد
Winer and Schreiner's The Inferior Colliculus is the first critical, comprehensive reference presenting the current knowledge ...
اقرأ المزيد
This book is about exploring interesting borderline cases of art. It discusses the cases of gustatory and olfactory artworks ...
اقرأ المزيدThis research aims to clarifying the definition of internal audit and how developing internal control and give recommendation ...
اقرأ المزيد