Biometric and auditing issues addressed in a throughput model /:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Charlotte, N.C. :
Information Age Pub.,
©2012.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (xi, 361 pages) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781617356551 1617356557 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn785782884 | ||
003 | OCoLC | ||
005 | 20240405112445.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 111014s2012 ncua ob 000 0 eng d | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d N$T |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCF |d OCLCO |d YDXCP |d OCLCQ |d AGLDB |d OCLCQ |d INT |d OCLCQ |d STF |d UKAHL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781617356551 |q (electronic bk.) | ||
020 | |a 1617356557 |q (electronic bk.) | ||
020 | |z 9781617356537 |q (pbk.) | ||
020 | |z 9781617356544 |q (hbk.) | ||
035 | |a (OCoLC)785782884 | ||
050 | 4 | |a HF5548.37 |b .R63 2012eb | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Rodgers, Waymond. | |
245 | 1 | 0 | |a Biometric and auditing issues addressed in a throughput model / |c by Waymond Rodgers. |
260 | |a Charlotte, N.C. : |b Information Age Pub., |c ©2012. | ||
300 | |a 1 online resource (xi, 361 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Introduction to auditing and biometrics applications -- Decision making techniques in auditing and biometrics -- Internal control biometrics systems -- Throughput modeling for sustainability-related issues -- Ethical issues addressed in biometrics management -- Biometrics legal and ethical issues -- Auditing secured biometric transactions: trust issues -- Fraud and internal control -- Auditing issues in internal control biometrics systems -- Conclusions. | |
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 0 | |a Biometric identification. |0 http://id.loc.gov/authorities/subjects/sh2001010964 | |
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Auditing, Internal. |0 http://id.loc.gov/authorities/subjects/sh85009482 | |
650 | 0 | |a Business enterprises |x Security measures. | |
650 | 6 | |a Gestion |x Informatique |x Sécurité |x Mesures. | |
650 | 6 | |a Identification biométrique. | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Vérification interne. | |
650 | 6 | |a Entreprises |x Sécurité |x Mesures. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a Auditing, Internal |2 fast | |
650 | 7 | |a Biometric identification |2 fast | |
650 | 7 | |a Business |x Data processing |x Security measures |2 fast | |
650 | 7 | |a Business enterprises |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
758 | |i has work: |a Biometric and auditing issues addressed in a throughput model (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFtyykcRc9c34mVPvXHmr3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Rodgers, Waymond. |t Biometric and auditing issues addressed in a throughput model. |d Charlotte, N.C. : Information Age Pub., ©2012 |w (DLC) 2011039435 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=469737 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH26834477 | ||
938 | |a ebrary |b EBRY |n ebr10534172 | ||
938 | |a EBSCOhost |b EBSC |n 469737 | ||
938 | |a YBP Library Services |b YANK |n 9597800 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn785782884 |
---|---|
_version_ | 1804748434836553728 |
adam_text | |
any_adam_object | |
author | Rodgers, Waymond |
author_facet | Rodgers, Waymond |
author_role | |
author_sort | Rodgers, Waymond |
author_variant | w r wr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .R63 2012eb |
callnumber-search | HF5548.37 .R63 2012eb |
callnumber-sort | HF 45548.37 R63 42012EB |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBU |
contents | Introduction to auditing and biometrics applications -- Decision making techniques in auditing and biometrics -- Internal control biometrics systems -- Throughput modeling for sustainability-related issues -- Ethical issues addressed in biometrics management -- Biometrics legal and ethical issues -- Auditing secured biometric transactions: trust issues -- Fraud and internal control -- Auditing issues in internal control biometrics systems -- Conclusions. |
ctrlnum | (OCoLC)785782884 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03850cam a2200721Ma 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn785782884</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240405112445.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">111014s2012 ncua ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781617356551</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1617356557</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781617356537</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781617356544</subfield><subfield code="q">(hbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)785782884</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.R63 2012eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rodgers, Waymond.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Biometric and auditing issues addressed in a throughput model /</subfield><subfield code="c">by Waymond Rodgers.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Charlotte, N.C. :</subfield><subfield code="b">Information Age Pub.,</subfield><subfield code="c">©2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 361 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction to auditing and biometrics applications -- Decision making techniques in auditing and biometrics -- Internal control biometrics systems -- Throughput modeling for sustainability-related issues -- Ethical issues addressed in biometrics management -- Biometrics legal and ethical issues -- Auditing secured biometric transactions: trust issues -- Fraud and internal control -- Auditing issues in internal control biometrics systems -- Conclusions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Biometric identification.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2001010964</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Auditing, Internal.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85009482</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion</subfield><subfield code="x">Informatique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Identification biométrique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Vérification interne.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Entreprises</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Auditing, Internal</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Biometric identification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Biometric and auditing issues addressed in a throughput model (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFtyykcRc9c34mVPvXHmr3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rodgers, Waymond.</subfield><subfield code="t">Biometric and auditing issues addressed in a throughput model.</subfield><subfield code="d">Charlotte, N.C. : Information Age Pub., ©2012</subfield><subfield code="w">(DLC) 2011039435</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=469737</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26834477</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10534172</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">469737</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9597800</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-ocn785782884 |
illustrated | Illustrated |
indexdate | 2024-07-16T15:03:49Z |
institution | BVB |
isbn | 9781617356551 1617356557 |
language | English |
oclc_num | 785782884 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xi, 361 pages) : illustrations |
psigel | ZDB-4-EBU |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Age Pub., |
record_format | marc |
spelling | Rodgers, Waymond. Biometric and auditing issues addressed in a throughput model / by Waymond Rodgers. Charlotte, N.C. : Information Age Pub., ©2012. 1 online resource (xi, 361 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references. Introduction to auditing and biometrics applications -- Decision making techniques in auditing and biometrics -- Internal control biometrics systems -- Throughput modeling for sustainability-related issues -- Ethical issues addressed in biometrics management -- Biometrics legal and ethical issues -- Auditing secured biometric transactions: trust issues -- Fraud and internal control -- Auditing issues in internal control biometrics systems -- Conclusions. Business Data processing Security measures. Biometric identification. http://id.loc.gov/authorities/subjects/sh2001010964 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Auditing, Internal. http://id.loc.gov/authorities/subjects/sh85009482 Business enterprises Security measures. Gestion Informatique Sécurité Mesures. Identification biométrique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Vérification interne. Entreprises Sécurité Mesures. BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh BUSINESS & ECONOMICS Workplace Culture. bisacsh Auditing, Internal fast Biometric identification fast Business Data processing Security measures fast Business enterprises Security measures fast Computer networks Security measures fast Computers Access control fast has work: Biometric and auditing issues addressed in a throughput model (Text) https://id.oclc.org/worldcat/entity/E39PCFtyykcRc9c34mVPvXHmr3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Rodgers, Waymond. Biometric and auditing issues addressed in a throughput model. Charlotte, N.C. : Information Age Pub., ©2012 (DLC) 2011039435 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=469737 Volltext |
spellingShingle | Rodgers, Waymond Biometric and auditing issues addressed in a throughput model / Introduction to auditing and biometrics applications -- Decision making techniques in auditing and biometrics -- Internal control biometrics systems -- Throughput modeling for sustainability-related issues -- Ethical issues addressed in biometrics management -- Biometrics legal and ethical issues -- Auditing secured biometric transactions: trust issues -- Fraud and internal control -- Auditing issues in internal control biometrics systems -- Conclusions. Business Data processing Security measures. Biometric identification. http://id.loc.gov/authorities/subjects/sh2001010964 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Auditing, Internal. http://id.loc.gov/authorities/subjects/sh85009482 Business enterprises Security measures. Gestion Informatique Sécurité Mesures. Identification biométrique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Vérification interne. Entreprises Sécurité Mesures. BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh BUSINESS & ECONOMICS Workplace Culture. bisacsh Auditing, Internal fast Biometric identification fast Business Data processing Security measures fast Business enterprises Security measures fast Computer networks Security measures fast Computers Access control fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2001010964 http://id.loc.gov/authorities/subjects/sh85029553 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85009482 |
title | Biometric and auditing issues addressed in a throughput model / |
title_auth | Biometric and auditing issues addressed in a throughput model / |
title_exact_search | Biometric and auditing issues addressed in a throughput model / |
title_full | Biometric and auditing issues addressed in a throughput model / by Waymond Rodgers. |
title_fullStr | Biometric and auditing issues addressed in a throughput model / by Waymond Rodgers. |
title_full_unstemmed | Biometric and auditing issues addressed in a throughput model / by Waymond Rodgers. |
title_short | Biometric and auditing issues addressed in a throughput model / |
title_sort | biometric and auditing issues addressed in a throughput model |
topic | Business Data processing Security measures. Biometric identification. http://id.loc.gov/authorities/subjects/sh2001010964 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Auditing, Internal. http://id.loc.gov/authorities/subjects/sh85009482 Business enterprises Security measures. Gestion Informatique Sécurité Mesures. Identification biométrique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Vérification interne. Entreprises Sécurité Mesures. BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh BUSINESS & ECONOMICS Workplace Culture. bisacsh Auditing, Internal fast Biometric identification fast Business Data processing Security measures fast Business enterprises Security measures fast Computer networks Security measures fast Computers Access control fast |
topic_facet | Business Data processing Security measures. Biometric identification. Computers Access control. Computer networks Security measures. Auditing, Internal. Business enterprises Security measures. Gestion Informatique Sécurité Mesures. Identification biométrique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Vérification interne. Entreprises Sécurité Mesures. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. BUSINESS & ECONOMICS Workplace Culture. Auditing, Internal Biometric identification Business Data processing Security measures Business enterprises Security measures Computer networks Security measures Computers Access control |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=469737 |
work_keys_str_mv | AT rodgerswaymond biometricandauditingissuesaddressedinathroughputmodel |