Mobile Computing Security Audit/Assurance Program

  • 13m
  • ISACA
  • ISACA
  • 2010
Designed to be used as a review tool and starting point, this book will provide management with an assessment of mobile computing security policies and procedures and their operating effectiveness.