Ver├Âffentlichungen Systemanwendung
  Code   Titel   Fundort   Heft   Verlag  
  ia1061   Piper, Arthur (Verf.)
Too much comfort?
Given the gap in the board's perception of IT risk and the reality organisations face, internal auditors may be doing a disservice to
  Internal Auditing & Business Risk   9
2007
  Warners Midland plc.  
  ia1060   Ruddenklau, Antony u.l Westberg, Peter (Verf.)
Closing the gap
There is a mismatch between the actual IT risks organisations face and their ability to get assurance on them, according to a joint report
  Internal Auditing & Business Risk   9
2007
  Warners Midland plc.  
  ia1154   Rowlands, James (Verf.)
Mapping the network
If organisations are to meet best practice standards in IT fovernance, they need to build a clear picture of what IT assets exist
  Internal Auditing   9
2010
  Warners Midland Inc.  
  ia604   Proctor, David (Verf.)
Y2K: Understanding the problem
  Internal Auditing   9
1999
  AS Advertising  
  ia605   Allen, Martin (Verf.)
Y2K: Action Plan
  Internal Auditing   9
1999
  AS Advertising  
  ia606   Cottell, Gus (Verf.)
Y2K: Project Waknesses
The Internal Auditing IT Supplement
  Internal Auditing   9
1999
  AS Advertising  
  IA346   MacKenzie, Robert (Verf.)
Keeping Viruses at Bay
  Internal Auditing   9
1996
  Institute of Internal Auditing (UK)  
  ia771   Blackman, David (Verf.)
Feeling lucky?
  Internal Auditing   9
2001
  AS Advertising  
  ST016   Tschanz, Rolf (Verf.)
EDV und Interne Revision
Am Bsp. der praktischen Erfahrung im Inspektorat des Migros-Genossenschafts-Bundes
  Der Schweizer Treuh├Ąnder, 54. Jahrgang, 9/1980   9
1980
  Buchdruckerei a/d Sihl AG  
  ST153   Gloor, Bruno; Zimmermann, Hans Peter (Verf.)
Software-Zertifizierung
  Der Schweizer Treuh├Ąnder, 61. Jahrgang, 9/1987   9
1987
  Buchdruckerei an der Sihl AG  
  wp162   Hertzsch, Andrea u. Schmitz, Eckhard (Verf.)
Die EDV als ein Werkzeug der Datenpr├╝fung im Rahmen
der Jahresabschlusspr├╝fung Eine empirische Untersuchung
  Die Wirtschaftspr├╝fung 8/1997   8
1997
  IDW-Verlag GmbH  
  ia962   Piper, Arthur (Verf.)
Data debacle
As data security becomes an increasingly importat issue, what can organisations do to keep sensitive information secure?
  Internal Auditing   8
2009
  Warners Midlands plc.  
  ia1121   Rowlands, James (Verf.)
Cutting software costs
Internal auditors can play an important role in efforts to cut the cost of software
  Internal Auditing   8
2009
  Warrners Midland plc.  
  ia963   Hobson, David (Verf.)
Plugging the holde
When there has been an IT security breach, the costs to plug the gap can be high difficult to assess.
  Internal Auditing   8
2008
  Warner Midland plc.  
  iu1104   Lanza, Richard B. and Brooks, Dean (Verf.)
Are You Looking Outside Enough?
Online information services can give auditors a wider perspective of their organization's business.
  Internal Auditor   8
2006
  The Institute of Internal Auditors  
  iu1106   Jackson, Russell A. (Verf.)
Getting a Grasp of IT
What level of technology expertise do audit leaders need to possess? Several experts share their thoughts on the systems knowledge
  Internal Auditor   8
2006
  The Institute of Internal Auditors  
  ia591   Bui, Andrew (Verf.)
Staying in Control
A customized database system enhances auditing's ability to manage internal controls.
  Internal Auditing   8
1999
  AS Advertising  
  ia594   Attawa, Morris C. (Verf.)
Billing Risks & SAP R/3
  Internal Auditing   8
1999
  AS Advertising  
  ia595   Glover, Prawitt and Romney (Verf.)
Software showcase
  Internal Auditing   8
1999
  AS Advertising  
  ia588   Hobson, David (Verf.)
Firewall Management
David Hobson continues his series on how to successfully implement and manage firewalls
  Internal Auditing   8
1999
  AS Advertising  
  IA342   Beale, Ian (Verf.)
A millennial crisis
The "Year 2000" problem is not just another groundless scare
  Internal Auditing   8
1996
  Institute of Internal Auditing  
  ia704   Adler, Robin (Verf.)
Self Certification in a Retail Branch Network
Many financial institutions use self-certification or assessment as a tool to improve the risk management of key parts of the business
  Internal Auditing   8
2000
  AS Advertising  
  iu368   Castellano, Michael (Verf.)
Automating expense reports
  Internal Auditor   8
1998
  The Institute of Internal Auditors  
  iu456   Attaway, Morris C. (Verf.)
Billing Risk & SAP R/3
  Internal Auditor   8
1999
  The Institute of Internal Auditors  
  iu453   Bui, Andrew (Verf.)
Staying in Control
A customized database system enhances auditing's ability to manage internal controls
  Internal Auditor   8
1999
  The Institute of Internal Auditors  
  iu250   Bjelke, Sten and Nilsson, Kjell (Verf.)
Automating the Self-Assessment Process
  Internal Auditor   8
1997
  The Institute of Internal Auditors  
  iu241   Bjelke, Sten u. Nilsson, Kjell
Computers and auditing
  Internal Auditor   8
1997
  editorial and advertising  
  iu244   Roesch, Laura and Henry, Laurie J. (Verf.)
Client/Server Systems
Audits of client/server systems must cover all crucial components
  Internal Auditor   8
1997
  Internal Auditor  
  iu243   Glover, Steven and Romney, Marshall (Verf.)
20 Hot Trends
The software revolution is fuelling change and challenge in internal auditing
  Internal Auditor   8
1997
  Internal Auditor  
  iu591   Biggin, Brain (Verf.)
Data Analysis With SQL
A government audit team unlocks the key to efficiency by employing highpowered query tools
  Internal Auditor   8
2002
  The Institute of Internal Auditors  
  iu592   Chapman, Christy (Verf.)
Power Tools 2002 Audit Software Usage Survey
Three avid users talk about how they use top-rated software products to automate their most important tasks.
  Internal Auditor   8
2002
  The Insitute of Internal Auditors  
  iu510   Figg, Jonathan (Verf.)
Partnering With IT
  Internal Auditor   8
2000
  The Institute of Internal Auditors  
  iu545   Price, Jimmy (Verf.)
Auditing E-business Applications
E-business audits are often best accomplished using a combination of IT and non-IT auditors
  Internal Auditor   8
2001
  The Institute of Internal Auditors  
  iu697   Coderre, Dave (Verf.)
Are You Ready for XBRL?
The de-facto standard for electronic business reporting provides auditors with an opportunity to increase efficiency and add value
  Internal Auditor   8
2004
  The Institute of Internal Auditors  
  ia456   Bodnar, George H. (Verf.)
Internet and Intranets: Network accounting
  Internal Auditing   7/8
1998
  Warren, Gorham & Lamon  
  WP131   Hanisch, Heinz (Verf.)
Die Pr├╝fung der Integrit├Ąt von Datenbanken (Teil II)
  Die Wirtschaftspr├╝fung, 7/1992, Jahrgang 45   7
1992
  IDW-Verlag GmbH  
  iu1144   Ugochuku, Ike (Verf.)
Auditing E-mail Clients
Comprehensive reviews of messaging systems and policies can help safeguard vital business communications
  Internal Auditor   7
2007
  The Institute of Internal Auditors  
  ia579   Hobson, David (Verf.)
Firewall Management
  Internal Auditing   7
1999
  AS Advertising  
  IA314   Berman, Jonathan (Verf.); IIA-UK (Hrsg.)
Legal tangles in the Web
  Internal Auditing 7/96   7
1996
  Progressive Printing (UK) Ltd.  
  ST758   Jans, Victor; Moor, Peter (Verf.)
Was macht eine gute Software aus?
Die Pr├╝fung der Informatik-Qualit├Ątssicherung durch die Informatik-Revision
  Schweizer Treuh├Ąnder 6-7/1997   6-7
1997
  Buchdruckerei a/d Sihl AG  
  zi862   Reitst├Ątter, Volker u. Riebau, Karsten (Verf.)
Aufdecken von Risiken bei der Bewertung des Vorratsverm├Âgens
nach Einf├╝hrung neuer EDV-Verfahren am Beispiel von SAP R/3
  ZIR   6/01
2001
  Erich Schmidt Verlag  
  WP130   Hanisch, Heinz (Verf.)
Die Pr├╝fung der Integrit├Ąt von Datenbanken (Teil I)
  Die Wirtschaftspr├╝fung, 6/1992, Jahrgang 45   6
1992
  IDW-Verlag GmbH  
  zi968   B├╝chel, Yvonne-Christina (Verf.)
Die Begleitung von IT-Projekten der Unternehmen durch die IR
  ZIR   6
2004
  Erich Schmidt Verlag  
  iu1082   Bordelon, Paul L. (Verf.)
Safeguarding Spreadsheets
Built-in software controls can protect the integrety of important financial data and formulas
  Internal Auditor   6
2006
  The Institute of Internal Auditors  
  zi770   Arbeitskreis "DV-Revision" (Verf.)
Pr├╝fung der DV-Archivierungs-Verfahren
  ZIR 6/98   6
1998
  Erich Schmidt Verlag  
  ZI685   IIR-Arbeitskreis "DV-Revision" (Verf.), DIIR (Hrsg.)
Pr├╝fungsaspekte beim Outsourcing von DV-Leistungen
  ZIR 6/94   6
1994
  Erich Schmidt Verlag  
  ia997   Rimmer, Nicola (Verf.)
Data security - an holistic approach
Two recent reports underline the need for an holistic approach to data risk, and suggest some practical advice for internal auditors
  Internal Auditing   6
2008
  Warners Midland plc.  
  iu1134   Kaplan, Jim (Verf.)
Leverage the Internet
For Web-savvy auditors, vast online resources are just a mouse click away.
  Internal Auditor   6
2007
  The Insitute of Internal Auditor  
  iu1135   Bassett, Jackie (Verf.)
Security in Mangement`s Terms
By translating audit findings about technology weaknesses into actions CEOs can takem auditors can make IT governance
  Internal Auditor   6
2007
  The Institute of Internal Auditors  
  zi1122   Arendt, Stefan u. Abbou, Mourad (Verf.)
Individuelle Datenverarbeitung
Beherrschbare Risiken im Fachbereich
  ZIR   6
2009
  Erich Schmidt Verlag  
  ia887   Judd, Micael (Verf.)
Open and flexible
A new generation of Enterprise Resource Planning solftware will make it easier for mid-sized companies to compete, collaborate
  Internal Auditing & Business Risk   6
2006
  Warners Midland plc.  
  ia687   Trumper, Ian and Quinlan, Kevin (Verf.)
How to handle a suspect PC
  Internal Auditing   6
2000
  AS Advertising  
  ia564   Silltow, John (Verf.)
Defence in Depth
  Internal Auditing   6
1999
  AS Advertising  
  ia438   Coderre, David (Verf.)
Audit software and the Year 2000
  Internal Auditing   6
1998
  AS Advertising  
  IA125   Turell, Mark; Holtham, Clive; Lindow, Yvonne (Verf.)
Meeting the challenge
  Internal Auditing   6
1994
  IIA-UK  
  ia565   Hobson, David (Verf.)
Firewall Management
Understanding what a firewall is and what it can do is essential in getting the best out of it
  Internal Auditing   6
1999
  AS Advertising  
  ia566   Forrest, Paul (Verf.)
Risks, barriers and opportunities
  Internal Auditing   6
1999
  AS Advertising  
  ia567   Foggon, Keith (Verf.)
Hostile Applets
Internet surfing is not always a safe occupation
  Internal Auditing   6
1999
  AS Advertising  
  iu356   Gibbs, Jeff (Verf.)
Going Live With SAP
  Internal Auditor   6
1998
  The Institute of Internal Auditors  
  iu584   Lamond, Bruce (Verf.)
Program Change Control
Effective custom-application management can mean the difference between smooth systems operation and costly down time
  Internal Auditor   6
2002
  The Institute of Internal Auditors  
  iu624   Attaway, Morris (Verf.)
Protecting Against Wireless Threats
Security risks abound in networking environments that allow untethered server access.
  Internal Auditor   6
2003
  The Institute of Internal Auditors  
  iu444   Everest-Hill, Deborah and Young, David (Verf.)
Automating Risk Assessment
  Internal Auditor   6
1999
  The Institute of Internal Auditors  
  iu432   Gray, Glen L. and Gray, Maryann Jacobi (Verf.)
Internal Auditors and Web Trust
  Internal Auditor   6
1999
  The Institute of Internal Auditors  
  iu431   Cashell, James D. and Aldhizer, George R. (Verf.)
Web Trust
  Internal Auditor   6
1999
  The Institute of Internal Auditors  
  iu425   Everest-Hill and Young (Verf.)
Automating Risk Assessment
High-tech tools help a government audit shop become more risk-focused and add value to customers
  Internal Auditor   6
1999
  The Institute of Internal Auditors  
  iu451   Gray, Glen L. and Jacobi Gray, Maryann (Verf.)
Internal Auditors And WebTrust
  Internal Auditor   6
1999
  The Institute of Internal Auditors  
  iu450   Cashell, James D. and Aldhizer, George R. (Verf.)
A SEAL OF APPROVAL
  Internal Auditor   6
1999
  The Institute of Internal Auditors  
  iu366   Gibbs, Jeff (Verf.)
Going Live With SAP
  Internal Auditor   6
1998
  The Institute of Internal Auditors  
  ST149   M├╝ller, Beat; Walder, Richard (Verf.)
Aspekte der Pr├╝fung von EDV-Applikationen
  Der Schweizer Treuh├Ąnder, 61. Jahrgang, 6/1987   6
1987
  Buchdruckerei an der Sihl AG  
  it017   Bou-Raad, Giselle and Capitanio, Carmel (Verf.)
THE IMPLICATIONS OF COMPUTER HACKING ON THE IA FUNCTION:
A BANKING INDUSTRY STUDY
  Internal Auditing   5-6
1999
  Warren, Gorham & Lamont/RIA Group  
  zi929   Jackmuth, Willi (Verf.)
SAP R/3 - eine vollst├Ąndige Pr├╝fung in zehn Tagen
Komplexe Systeme verlangen eine komplexe Pr├╝fungsstrategie
  ZIR   5
2003
  Erich Schmidt Verlag  
  re73   Gork, Konstantin (Verf.)
Pr├╝fen der Netzwerkdienste unter Unic/Linux
  Revisionspraxis   5
2008
  Ottokar Schreiber Verlag  
  re74   Foth, Michael (Verf.)
Revision u. IT-Forensik: Die Beweissicherung
  Revisionspraxis   5
2008
  Ottokar Schreiber Verlag  
  ia1052   Voo, Correy (Verf.)
Backup to the future
Many organisations back their data up inefficiently, or in ways in which they have little easy access to important data.
  Internal Auditing & Business Risk   5
2007
  Warners Midland plc.  
  ao14   Schramm, Christoph (Verf.)
Pr├╝fung von CICS
  10/1997   5
1997
  SecuMedia Verlags GmbH, Kes  
  IA373   Oliphant, Alan (Verf.)
There`s a thief about
  Internal Auditing 5/1997   5
1997
  Institute of Internal Auditors (UK)  
  ia422   McGuire, Tim (Verf.)
Neural networks
Many audit departments will soon be using computer systems that not only know what to do, but can also learn new skills
  Internal Auditing   5
1998
  AS Advertising  
  IU175   Coderre, Dave (Verf.), IIA-USA (Hrsg.)
Time Bomb 2000
  Internal Auditor   5
1996
  IIA-USA  
  ZI145   S├Âder, Claus Peter
Revision von EDV-Programmen mittels Testdaten
  ZIR   4/
1971
  Erich Schmidt Verlag  
  ZI335   Dinnebier, Olaf; Schwaderer, J├Ârg
Kontrollsystem bei EDV-Verfahren
  ZIR   4/
1979
  Erich Schmidt Verlag  
  zi957   Ak: "IT-Revision" (Verf.)
Risikomanagemet und Fr├╝hwarnsystem bei IT-Projekten
  ZIR   4
2004
  Erich Schmidt Verlag  
  iu1076   Weidenmier, Marcia L. (Verf.)
Is IT next for ERM?
Information technology provides the vital infrastructure for building a modern enterprise
  Internal Auditor   4
2006
  The Institute of Internal Auditors  
  zi925   Wildensee, Christoph (Verf.)
Tabellen-Debugging in SAP R/3 - Eine untersch├Ątzte Gefahrenquelle in der Administration
  ZIR   4
2003
  Erich Schmidt Verlag  
  zi765   Wildensee, Christoph (Verf.)
Einsatz von Siron als Retrievalsystem f├╝r SAP R/2
  ZIR 4/98   4
1998
  Erich Schmidt Verlag  
  zi891   Wildensee, Christoph (Verf.)
SAP R/3 - Besonderheiten des Systems bei der Pr├╝fung des Berechtigungskonzeptes
  ZIR   4
2002
  Erich Schmidt Verlag  
  ST753   Brunner, J├╝rgen; D├Ânni, Benedikt (Verf.)
Leistungsf├Ąhiges F├╝hrungsinformationssystem f├╝r das Management
Informationsverarbeitung als zentrale Herausforderung
  Schweizer Treuh├Ąnder 4/1997   4
1997
  Buchdruckerei a/d Sihl AG  
  ZI611   Pistorius, Stefan
"COCHECK" - Ein Revisionswerkzeug zur Softwareanalyse
  ZIR 4/91   4
1991
  Erich Schmidt Verlag  
  re39   Lillich, Claus-Dieter (Verf.)
SAP Business Information Warehouse
Chancen und Risiken - Letzter Teil: "Automatisch und WERTvoll"
  PRev Revisionsparxis   4
2006
  Ottokar Schreiber Verlag  
  re40   Jekel, Nicole (Verf.)
IT-Effizienz: Kontrolle und Messung mit der Balanced Scorecard (BSC)
  PRev Revisionspraxis   4
2006
  Ottokar Schreiber Verlag  
  re41   Vossbein, Reinhard (Verf.)
IT-Sicherheitsnormen als Pr├╝fstandards f├╝r die Revision
  PRev Revisionspraxis   4
2006
  Ottokar Schreiber Verlag  
  re42   Hinck, Nils-Christian u. Schulze, Reinhard (Verf.)
Schriftgutmanagement
Best Practices aus prozessualer Sichtweise von IT-Auditoren
  PRev Revisionspraxis   4
2006
  Ottokar Schreiber Verlag  
  zi1007   Kunze, Gerhard u. ├ľzbek, Hakan (Verf.)
Computer-Forensik - wesentlicher Bestandteil der Revisionsarbeit zur Aufkl├Ąrung wirtschaftskrimineller Hanldungen
  ZIR   4
2006
  Erich Schmidt Verlag  
  zi1009   Taubenberger, Stefan (Verf.)
Pr├╝fungsplanung in der EDV-Revision - Ein IT-Audit-Universe Modell
  ZIR   4
2006
  Erich Schmidt Verlag  
  re60   Schrott, Gerald (Verf.)
Methoden zur Spurverfolgung in SAP-System
  PRev - Revisionspraxis   4
2007
  Ottokar Schreiber Verlag  
  re61   Vossbein, Reinhard (Verf.)
IT-Risikomanagement - eine Aufgabe der Internen Revision
  PRev - Revisionsparxis   4
2007
  Ottokar Schreiber Verlag  
  re64   Kuznik, Engels u. Hluchy (Verf.)
Buchungskreis├╝bergreifende Analyse von Doppelzahlungen mit Hilfe der Pr├╝fsoftware IDEA
  PRev - Revisionspraxis   4
2008
  Ottokar Schreiber Verlag  
  re65   Vossbein, Reinhard (Verf.)
IT-Security-Revision und IT-Security-Controlling
  PRev - Revisionspraxis   4
2008
  Ottokar Schreiber Verlag  
  ao94   Beilke, Bernd (Verf.)
Die elektronische Unterschriftenzeremonie
Der elektronische Personalauswei, die Gesundheitskarte od. Bankkarten zeigen: Formular verabschieden sich allm├Ąhlich von der Papierform
  IT-Grundschutz   4
2009
  SercuMedia Verlags-GmbH  
  iu1223   Mukherjee, Uttam (Verf.)
the Good, the Bad, and the Ugly
Auditors can help protect their organizatiion from errors and fraud by putting spreadsheet risks in their sights.
  Internal Auditor   4
2009
  The Institute of Internal Auditors  
  ao97   Freitag, Norbert (Verf.)
Auf der Suche nach den Daten
vorbereitung f├╝r den forensischen Ernstfall
  IT-Grundschutz   4
2009
  SecuMedia Verlags-GmbH  
  iu1232   Mukherjee, Uttam (Verf.)
The Good, the Bad, and the Ugly
Auditors can help protect their organization from errors and fraud by putting spreadsheet risks in their sights
  Internal Auditor   4
2009
  The Institute of Internal Auditors  
  ao96   Balfanz, Judith (Verf.)
Elektronische Zeitstempel
Gesetzlich verankerte Absicherung f├╝r elektronische Gesch├Ąftsprozesse aller Art
  IT-Grundschutz   4
2009
  SecMedia Verlags-GmbH  
  ia667   Castillo, Paul and Smith, Gordon (Verf.)
15 Ways to Penetrate Your Network
  Internal Auditing   4
2000
  AS Advertising  
  ia414   Urbancic Frank (Verf.)
Ethics web sites: resources for internal auditor
  Internal Auditing   4
1998
  Internal Auditing  
  iu422   Attawa, Morris C. (Verf.)
Wired Business
  Internal Auditor 4/1999   4
1999
  The Institut of Internal Auditors  
  iu532   Attaway, Morris C. (Verf.)
Cash Disbursements Control
  Internal Auditor   4
2001
  The Institute of Internal Auditors  
  iu495   Paukowits, Frank and Paukowits, Ken (Verf.)
Bridging CAATs and Risk
  Internal Auditor   4
2000
  The Institute of Internal Auditors  
  iu344   Coderre David G. (Verf.)
A full service fraud
  Internal Auditor   4
1998
  The Institute of Internal Auditors  
  iu578   McCollum, Tim (Verf.)
Applications Control
Software behavior monitoring offers another layer of protection to corporate information systems
  Internal Auditor   4
2002
  The Institute of Internal Auditors  
  iu475   Paukowits, Frank and Paukowits, Ken (Verf.)
Bridging CAATs and risk
A four-phase plan of attack enables auditors to tackle software issues head-on during risk assessment
  Internal Auditor   4
2000
  The Institute of Internal Auditors  
  iu304   Hudson Mary (Verf.)
CAATs and Compliance
  Internal Auditor   4
1998
  The Institute of Internal Auditors  
  it180   Pathak, Jagdish (Verf.)
Internal Audit And E-Commerce Controls
  Internal Auditing   3-4
2003
  Warren, Gorham & Lamont of RIA  
  ZI243   Fischer, Hans-J├╝rgen; Schneider, Josef
Revisionsaspekte bei "belegloser" Datenerfassung
  ZIR   3/
1976
  Erich Schmidt Verlag  
  ZI429   Haschke, Wolfgang
Vorgehensweise bei der Revision von EDV-Anwendungs-
gebieten
  ZIR   3/
1983
  Erich Schmidt Verlag  
  zi814   Arbeitskreis u. Arbeitsgruppe (Verf.)
Besonderheiten bei der Planung u. Durchf├╝hrung von DV-Pr├╝f.
in ausl├Ąndischen Betriebsstellen
  ZIR 3/2000   3
2000
  Erich Schmidt Verlag  
  zi841   Anghel, Ren├ę (Verf.)
Nutzen und Chancen des Internets f├╝r die Interne Revision
  ZIR   3
2001
  Erich Schmidt Verlag  
  zi843   Wildensee, Christoph (Verf.)
Privatnutzung der dienstlichen DV-Ausstattung - PC-Spiele
und deren Auswirkungen auf das Unternehmen
  ZIR   3
2001
  Erich Schmidt Verlag  
  zi816   Odenthal, Roger (Verf.)
Vorgehensmodell zur Pr├╝fung des Berechtigungswesens
in der SAP R/3-Umgebung
  ZIR 3/2000   3
2000
  Erich Schmidt Verlag  
  zi749   IIR-Arbeitskreis "DV-Revision"
Grundsatzfragen zur strategieorientierten Revision von
Client/Server-Architekturen
  ZIR 3/97   3
1997
  Erich Schmidt Verlag  
  ST712   H├Ąnni, Urs P.; Jans Victor (Verf.)
Wie sicher ist das Internet ?
Die Auswirkungen der Vernetzung auf die Informatik-Sicherheit
  Schweizer Treuh├Ąnder 3/1996   3
1996
  Buchdruckerei a/d Sihl AG  
  ia872   Robertson, Neil (Verf.)
Reframing the picture
A new version of the industry standard on IT governance has expanded ist ambitions and now provides firm guidance to managment as well
  Internal Auditing & Business Risk   3
2006
  Warners Midlands plc  
  re70   Rohr, Sebastian (Verf.)
Herausforderungen an die Sicherheit von Web-Services und service-oriented architecures (SOA)
  Prev   3
2008
  Ottokar Schreiber  
  ZI1136   P. R. Bitterli / E. Liniger (Verf.)
IKS-Simulation - ein "neuer" Ansatz zur Verbesserung der Akzeptanz und Wirtschaftlichkeit von (IT-)Pr├╝fungen
  ZIR   3
2010
  Erich Schmidt Verlag GmbH & Co.  
  re93   Lohre, Thomas (Verf.)
ISO 31000: Der neue Risikomanagement-Standard im direkten Vergleich mit dem COSO-Regelwerk
  Prev   3
2009
  Ottokar Schreiber  
  re37   Foth, Michael (Verf.)
Pr├╝fung durch alle Schichten
  Revisionspraxis   3
2006
  Ottokar Schreiber  
  re34   Lillich, Claus-Dieter (Verf.)
SAP Business Information Warehouse
Chancen und Risiken - Teil III: "Berechtigungen - Ein weites Feld"
  Revisionpraxis   3
2006
  Ottokar Schreiber  
  re33   Wildensee, Christoph (Verf.)
├ťberblick ├╝ber die SAP IS-U-Funktions- und Berechtigungsparameter durch IDEX-GE
  Revisionspraxis   3
2006
  Ottokar Schreiber  
  re36   Hirsch, Axel (Verf.)
Pr├╝fung einer "Wide Area Network"-Infrastruktur am Beispiel einer ausgelagerten Dienstleistung
  Revisionspraxis   3
2006
  Ottokar Schreiber  
  ia650   Coderre, David (Verf.)
Data Profiling
  Internal Auditing   3
2000
  AS Advertising  
  ia743   Teji, Tarlok and Kettel, Matt (Verf.)
Mastering risk beyond Turnbull
  Internal Auditing   3
2001
  AS Advertising  
  IA009   Lindup, Kenneth (Verf.); IIA UK (Hrsg.)
Business resumption planning
(Kontingentplanung)
  Internal Auditing   3
1993
  IIA UK  
  IA010   Osborne, Keith (Verf.); IIA UK (Hrsg.)
Auditing the computer security function
  Internal Auditing   3
1993
  IIA-UK  
  ia659   Proctor, David (Verf.)
It's not Rocket Science
There is no rocket science involved in the use of file interrogation software
  Internal Auditing   3
2000
  AS Advertising  
  ia542   Bentley, David (Verf.)
Internal Auditors make increasing use of computers
  Internal Auditing   3
1999
  AS Advertising  
  ia540   Birkbeck, Andrew (Verf.)
Toil and Tools
Operating System Reviews
  Internal Auditing   3
1999
  AS Advertising  
  ia563   Moriarty, Stephen (Verf.)
Challenges and opportunities
The Millennium issue from the perspective of the software industry
  Internal Auditing   3
1999
  AS Advertising  
  ia655   Proctor, David (Verf.)
Welcome
  Internal Auditing   3
2000
  AS Advertising  
  ia404   Price, David (Verf.)
Oh no! Not the year two thousand again
  Internal Auditing   3
1998
  AS Advertising  
  ia656   Thomas, George (Verf.)
A new role for IT Audit
  Internal Auditing   3
2000
  AS Advertising  
  ZI323   Fischer, Hans-J├╝rgen
Zum gegenw├Ąrtigen Stand der Pr├╝fung
computergest├╝tzter Verfahren
  ZIR   2/
1979
  Erich Schmidt Verlag  
  ZI177   Nagel, Kurt
Interne Revision und Systempr├╝fung bei EDV-Organisationen
- Stand der Entwicklungstendenzen
  ZIR   2/
1973
  Erich Schmidt Verlag  
  ZI291   Martien├č, R├╝diger
R├╝ck├╝bersetzungsprogramme als Hilfsmittel
der EDV-Revision zur sachlogischen Pr├╝fung von EDV-Programmen
  ZIR   2/
1978
  Erich Schmidt Verlag  
  ZI269   Welzel, Horst
Aktuelle Probleme der "beleglosen" Datenerfassung
  ZIR   2/
1977
  Erich Schmidt Verlag  
  zi837   Krebs, Stefan (Verf.)
Risikosteuerung in der IT-Revision
  ZIR   2
2001
  Erich Schmidt Verlag  
  zi806   IIR-Arbeitskreis "IT-Revision"
Einsatz von Software f├╝r Revisionszwecke
  ZIR 2/2000   2
2000
  Erich Schmidt Verlag  
  ia867   Wyatt, Jonathan and Bolderson, Scott (Verf.)
Excel in managing spreadsheet risk
Finance would be virtually unthinkablewithout the humble spreadsheet
  Internal Auditing & Business Risk   2
2006
  Warners Midlands plc  
  zi978   Herde, Riedl und Wenig (Verf.)
Chancen der Internen Revision durch die GDPdU
  ZIR   2
2005
  Erich Schmidt Verlag  
  iu1068   Peterson, Heninger, Lindstrom, and Romney (Verf.)
How Secure is your Wirelessnetwork
Six basic steps can enhance security in environments where electronic data data roams the airwaves
  Internal Auditor   2
2006
  The Institute of Internal Auditors  
  zi913   IIR-Arbeitskreis "IT-Revision" (Verf.)
Ans├Ątze zur Pr├╝fung von IT-Netzwerken
  ZIR   2
2003
  Erich Schmidt Verlag  
  zi1062   Janke, G├╝nter (Verf.)
Zombierechner, Spam u. Interne Revision
  ZIR   2
2008
  Erich Schmidt Verlag  
  zi1063   Hagemeister, Lui u. Kons (Verf.)
Individuelle Datenverarbeitung in den Unternehmen
Anforderungen aus Sicht der Ordnungsm├Ą├čigkeit
  ZIR   2
2008
  Erich Schmidt Verlag  
  iu1161   Taiariol, Robert (Verf.)
Segregated Duties in Fashion
Auditors help Benetton tailor an automated process for greater control over conflicting functions
  Internal Auditor   2
2009
  The Institute of Internal Auditors  
  zrfc62   Mossanen, Kian u. Amberg, Michael (Verf.)
IT-Compliance
Herausforderungen der Informationstechnologie
  ZRFC   2
2009
  Erich Schmidt Verlag  
  re89   Vo├čbein, Reinhard (Verf.)
Management von Risiken der IT-Sicherheit/IT-Security
  Prev   2
2009
  Ottokar Schreiber  
  ia804   Walker-Osborn, Charlotte (Verf.)
Identity crisis
Legislation in the pipeline will help organisations to combat phishing and identity theft. In the meantime, they should act to protect themselves
  Internal Auditing & Business Risk   2
2005
  The Institute of Internal Auditors  
  ia801   Piper, Arthur (Verf.)
Shout about IT
A new survey suggests while IT internal audit is highly valued, it needs to be given more prominence in organisations
  Internal Auditing & Business Risk   2
2005
  The Institute of Internal Auditor  
  IA353   Khan, Kamel (Verf.)
For your eyes only
Data protection is not just good corporate practice
  Internal Auditing 2/1997   2
1997
  Institute of Internal Auditors (UK)  
  ia525   Morris, Martin (Verf.)
Policing the internet
  Internal Auditing   2
1999
  AS Advertising  
  iu526   Attaway, Morris C. (Verf.)
Privaty in the workplace and on the web
Consumers and employees are becoming more concerned about their privacy, both online and off.
  Internal Auditor   2
2001
  The Institut of Internal Auditors  
  iu572   Campbell, Diane Sears (Verf.)
Focus on Cyber-Fraud
The Internet has added another dimension to internal auditorsÄ battle against fraud
  Internal Auditor   2
2002
  The Institute of Internal Auditor  
  iu571   Spindel, Brian (Verf.)
Benchmarking System Security
A new assessment tool can help auditors measure computer security against established benchmarks
  Internal Auditor   2
2002
  The Institute of Internal Auditors  
  iu527   Rezaee, Zabiholah and Brandon, Larry D. (Verf.)
Legislating Privacy
As companies consolidate financial services and increasingly more personal information travels over the Internet
  Internal Auditor   2
2001
  The Institute of Internal Auditors  
  IU212   Prawitt, Douglas F.; Romney, Marshall B. (Verf.)
Emerging Business Technologies
How can internal audit shops mitigate the risk and exposures
  Internal Auditor 2/1997   2
1997
  IIA (USA)  
  iu401   Nigrini, Mark J. (Verf.)
Adding Value with Digital Analysis
Internal auditing's quick and revealing data analysis proves invaluable in the acquisition process
  Internal Auditor   2
1999
  The Institute of Internal Auditors  
  re11   Geis, Ivo (Verf.)
E-Mail und Revision
Rechtswirksamkeit von E-Mail Erkl├Ąrungen
  ReVision   2
2005
  OSV Ottokar Schreiber Verlag  
  it009   Cerullo, Cerullo and Hardin (Verf.)
Computer Techniques Used to Audit the Purchasing Function
  Internal Auditing   2
1999
  Warren, Gorham & Lamont  
  iu409   Nigrini, Mark J. (Verf.)
Adding Value with Digital Analysis
Internal auditing's quick and revealing data analysis proves invaluable in the aquisition process.
  Internal Auditor   2
1999
  The Institute of Internal Auditors  
  iu299   Gibbs, Jefe and Gibson, Susan (Verf.)
Organizational Effectiveness
  Internal Auditor   2
1998
  The Institute of Internal Auditors  
  iu286   Paukowits, Frank (Verf.)
Mainstreaming CAATs
  Internal Auditor   2
1998
  The Institute of Internal Auditors  
  iu467   Kirk, Brad (Verf.)
Delivering Speed, Accuracy, Compliance
Data analysis software facilitates review and testing procedures in a financial services organization
  Internal Auditor   2
2000
  The Insitute of Internal Auditors  
  iu472   Bigler, Mark (Verf.)
Computer forensics
  Internal Auditor   2
2000
  The Institute of Internal Auditors  
  iu284   Half, Robert (Verf.)
Update
  Internal Auditor   2
1998
  The Institute of Internal Auditors  
  WP154   W├Ąhner, Gerd W. (Verf.)
EDV-Revision im Bereich des Rechnungswesens bei Einsatz
von EDI und EDIFACT
  Die Wirtschaftspr├╝fung, 15/1995, Jahrgang 48   15
1995
  IDW-Verlag GmbH  
  wp160   Will, Hartmut
Pr├╝fsoftware aus globaler Sicht
  Die Wirtschaftspr├╝fung 13/1997   13
1997
  IDW-Verlag GmbH  
  ST665   Berweiler, Georges (Verf.)
La ma├«trise du syst├Ęme d'information - une pr├ęoccupa-
tion de l'audit interne?
  Schweizer Treuh├Ąnder 12/1994   12
1994
  Buchdruckerei a/d Sihl AG  
  st845   Jung, Patrick (Verf.)
Pr├╝fung im SAP-Umfeld von ABB-Schweiz - ein Erfahrungsbericht
Herausforderungen eines integrierten IT-Systems an die IR
  Schweizer Treuh├Ąnder 12/1999   12
1999
  Sihl AG  
  iu1213   Chandra, Ishwar (Verf.)
The Five C's of IT Policy
Reviewing the effectiveness of information security policies is a key part of IT audit plans
  Internal Auditor   12
2008
  The Institute of Internal Auditor  
  AO009   Hackel, Helmut (Verf.)
Sicherheit durch Testate
Unabh├Ąngige Experten bescheinigen "GOB" bei computer- gest├╝tzten Verfahren
    12
1993
  Verlag C.H. Beck  
  ia734   Wallhoff, John (Verf.)
Improving processes with ACL
  Internal Auditing   12
2000
  AS Advertising  
  ia735   Ridley, Jeffrey (Verf.)
How effective is your audit committee?
  Internal Auditing   12
2000
  AS Advertising  
  iu277   Stone, William (Verf.)
Electronic commerce
Can internal auditors help to mitigate the risks?
  Internal Auditor   12
1997
  The Institute of Internal Auditor  
  iu276   Lanza, Richard (Verf.)
Audit raw, not "cooked", data
  Internal Auditor   12
1997
  The Institute of Internal Auditors  
  iu297   Roth, James and Espersen, Donald (Verf.)
Risky E-business
E-business success depends in large part on the risk managers ability to measure three major exposures
  Internal Auditor   12
2001
  The Institute of Internal Auditors  
  iu291   Mason, Jeffrey N. and Hoffacker, Mark (Verf.)
Gathering Client-server Data
A server utility helps auditors at a large confectionary products manufacturer gather configuration data across their company's network
  Internal Auditor   12
2001
  The Institute of Internal Auditors  
  iu394   Garceau, Matejka, Mista and Rozen (Verf.)
The Electronic Envelope
  Internal Auditor   12
1998
  The Institute of Internal Auditors  
  iu459   Lehman, Mark W. (Verf.)
Searching for Unusual Transactions
An electronic data-analysis technique enables auditors to unearth hidden fraudulent transactions
  Internal Auditor   12
1999
  The Institute of Internal Auditors  
  ST160   Uebersax, Rolf (Verf.)
PC-Revision: Aspekte der Organisation und Sicherheit
  Der Schweizer Treuh├Ąnder, 61. Jahrgang, 12/1987   12
1987
  Buchdruckerei an der Sihl AG  
  iu606   Kumar, Vishesh (Verf.)
Digital Leakage
Ensuring the confidentiality of intellectual property proves difficult when sensitive documents reside in electronic format
  Internal Auditor   12
2002
  The Institute of Internal Auditors  
  iu654   Stone, David L. and Marotta, Dean L. (Verf.)
Leveraging Risk Technology
A large, multifacted financial-services company develops a Web-based tool to facilitate ist risk management efforts
  Internal Auditor   12
2003
  The Institute of Internal Auditors  
  iu981   Bigler, Mark (Verf.)
Single Sign-on
With SSO technology, manging user access acorss multiple applications can be a one-step process
  Internal Auditor   12
2004
  The Institute of Internal Auditors  
  it89   Varney, Thomas (Verf.)
Computer Forensics
  Internal Audititng   11/12
2000
  Warren, Gorham & Lamont/RIA  
  wp236   Fr├Âhlich, Martin und Heese, Klaus (Verf.)
Ordnungsm├Ą├čigkeit und Sicherheit der rechnungslegungsbezogenen
Informationssysteme im E-Business
  Die Wirtschaftspr├╝fung   11
2001
  IDW-Verlag  
  ia986   Cooper, Roger u.l Wilson, Fred (Verf.)
Access denied?
Access databases can be very flexible, but make sure you control the applications end-users are allowed to create
  Internal Auditing & Business Risk   11
2007
  Warners Midland plc.  
  ia498   Sheldon, Andrew (Verf.)
Forensic auditing
The role of computer forensics in the corporate toolbox
  Internal Auditing   11
1998
  AS Advertising  
  ia616   Smith, Gordon E. (Verf.)
Auditing the Internet Connection
  Internal Auditing   11
1999
  AS Advertising  
  ia617   Barling, Chris (Verf.)
Working together Not Competing
  Internal Auditing   11
1999
  AS Advertising  
  ia775   Burns, Mike (Verf.)
Automating the audit process
  Internal Auditing   11
2001
  AS Advertising  
  ia774   Internal Auditing (Verf.)
Match point
  Internal Auditing   11
2001
  AS Advertising  
  iu272   Smith, Greg (Verf.)
Data protection: why the auditor could be liable
  Internal Auditor   11
1997
  The Institute of Internal Auditors  
  iu271   Goodwin, Candice (Verf.)
Can your computer keep a secret?
  Internal Auditor   11
1997
  The Institute of Internal Auditors  
  iu1168   Simkin, Mark G. (Verf.)
Simplifying Complexity
Spreadsheet lookup tables are powerful tools for multivariable computations.
  Internal Auditor   10
2006
  The Institute of Internal Auditors  
  ia614   Bentley, David (Verf.)
Getting Web Wise on Year 2000
Do not just rely on the press to keep you up to date with Y2K issues. Surf the net for the latest in tools and techniques
  Internal Auditing   10
1999
  AS Advertising  
  ia395   Iyer, Nigel and Gilham, Matthew (Verf.)
Footsteps of fraud
Technology can help detect fraud
  Internal Auditing   10
1997
  AS Advertising  
  ia717   Machin, Sheppard, Nelson, Hardy (Verf.)
Do you get e-everything?
  Internal Auditing   10
2000
  AS Advertising  
  iu552   Bacon, Chris N. (Verf.)
Auditing 401 (k)s with CAATs
  Internal Auditor   10
2001
  The Institute of Internal Auditor  
  so151   Sp├Ânlein, Rita (Verf.)
DV-gest├╝tzte Betriebspr├╝fung in Frankreich
  10/97   10
1997
  Erich Schmidt  
  zi774   Mosblech, H├Âlcker, Schaaf (Verf.)
Pr├╝fung der Software-Lizenzen
  ZIR 1/2 99   1/2
1999
  Erich Schmidt Verlag  
  ZI149   Minrath, Ernst
Revision der Verarbeitung von Bewegungsdaten
  ZIR   1/
1972
  Erich Schmidt Verlag  
  ZI148   Kiefer, Dieter; Wagner, Theo
Revision des Stammdaten-Änderungsdienstes
  ZIR   1/
1972
  Erich Schmidt Verlag  
  ZI463   IIR-Arbeitskreis DV-Revision
Wirtschaftlichkeitsaspekte bei der Anwendungs-
Programmierung aus der Sicht der Internen Revision
  ZIR   1/
1985
  Erich Schmidt Verlag  
  ZI258   B├Âkamp, Heinz; Hauser, Wolfgang
Revision der Verfahrensentwicklung
  ZIR   1/
1977
  Erich Schmidt Verlag  
  ZI489   IIR-Arbeitskreis DV-Revision
├ťberlegungen zur Qualit├Ątssicherung von
Anwendersoftware aus der Sicht der Revision
  ZIR   1/
1986
  Erich Schmidt Verlag  
  re26   Lillich, Claus-Dieter (Verf.)
SAP® Business Information Warehouse
Chancen und Risiken
  PRev-Revisionsparxis   1
2006
  Ottokar Schreiber Verlag GmbH  
  zi831   IIR-Arbeitskreis "IT-Revision" (Verf.)
Kontrolle und Sicherheitsaspekte bei E-Commerce
  ZIR   1
2001
  Erich Schmidt Verlag  
  zi878   IIR-Arbeitskreis "Bausparkassen" (Verf.)
Verwendung von IT-Werkzeugen f├╝r die Revision in Bausparkassen
  ZIR   1
2002
  Erich Schmidt Verlag  
  zi755   Flemming Martin (Verf.)
Nutzungsm├Âglichkeiten des Internets f├╝r die Revisionsarbeit
  ZIR 1/98   1
1998
  Erich Schmidt Verlag  
  re84   Lohre, Thomas (Verf.)
Pr├╝fung des IT-Service-Management nach ITIL v3
  PRev Revisiionspraxis   1
2009
  Ottokar Schreiber Verlag  
  re82   Schmidt, Andreas H. (Verf.)
Das Modell des normativen Prismas
Die Einordnung von nationalen Normen in das COSO II ERM u. deren Auswirkungen auf Pr├╝fungshandlungen im Rahmen des CobiT
  PRev Revisionspraxis   1
2009
  Ottokar Schreiber Verlag  
  zi1022   Ritzmann, Emanuel u. Egger, Axel (Verf.)
IKS-Prozesse auf dem richtigen Gleis
SOX auf freiwilliger Basis - Umsetzung mithilfe einer Standardsoftware bei den Schweizerischen Bundesbahnen (SBB AG)
  ZIR   1
2007
  Erich Schmidt Verlag  
  zi1021   IIR-AK: "IT-Revision" (Verf.)
Revisionsaspekte bei User-Management-Systemen (UMS)
  ZIR   1
2007
  Erich Schmidt Verlag  
  ia1025   Debrecen, Roger (Verf.)
Controlling IT
A forthcoming IT assurance guide aims to help internal auditors get the most out of COBIT.
  Internal Auditing & Business Risk   1
2007
  Warners Midland plc.  
  re79   Gork, Konstantin (Verf.)
Pr├╝fen von Fernwartungszug├Ąngen
  PRev Revisionspraxis   1
2008
  Ottokar Schreiber  
  ia740   Teixeira, Tom (Verf.)
Risk management and IT
  Internal Auditing   1
2001
  AS Advertising  
  re4   Schreiber, Sebastian (Verf.)
CheckAud for SAO R/3 Version 2.8
  Revision   1
2005
  Ottokar Schreiber Verlag  
  IU1300   Hill, Edward (Verf.)
The Relevant IT Audit
  Internal Auditor   Juni
2011
  The Institute of Internal Auditors  
  IU1295   Mar, Steve (Verf.)
The New Internet Protocol
  Internal Auditor   Juni
2011
  The Institute of Internal Auditors  
  RE105   Lohre, Thomas (Verf.)
Informationssicherheits-Managementsystem nach ISO/IEC 27001. Ein Aufgabenfeld auch f├╝r die Interne Revision
  Revisionspraxis Prev   5
2010
  Boorberg Verlag  
  RE52   Vossbein, Reinhard (Verf.)
Revisionstools im Bereich IT-Sicherheit effizient einsetzen
  Prev   2
2007
  Ottokar Schreiber GmbH  
  id70   Odenthal, Roger
Pr├╝fsoftware im Einsatz
Handbuch f├╝r die praktische Analyse von Unternehmensdaten
   
2006
  Datev eG  
  id83   Rai, Bresz, Renshaw, Rozek u. White
Identity and Access Management
   
2007
  The Instite of Internal Auditors  
  f├Â38   Taubenberger, Stefan
Pr├╝fungsplanung in der EDV-Revision - Ein IT-Audit-Universe Modell
  F├Ârderpreis  
0
   
  id81   Wegrzynowicz, Karine u. Stein, Steven
Global Technology Audit Guide (GTAG) 12: Audit IT Projects
   
2009
  The Institute of Internal Auditors  
  dv112   The Institute of Internal Auditors
Managing and Auditing IT Vulnerabilities
   
2006
  The Institute of Internal Auditors  
  id75   Hahn, Askelson u. Stiles
Global Technology Audit Guide 5: Managing and Auditing Privacy Risks
   
2006
  The Institute of Internal Auditors  
  id76   Romanosky, Kim u. Kravchenko
Global Technology Audit Guide 6: Managing and Auditing IT Vulnerabilities
   
2006
  The Institute of Internal Auditors  
  id90   Gr├╝nder, Torsten
IT-Outsourcing in der Praxis
Strategien, Projektmanagement, Wirtschaftlichkeit
   
2011
  Erich Schmidt Verlag  
  id89   T├Ânnissen, Stefan
Revision der IT-Governance mit CoBiT
Leitfaden f├╝r die Pr├╝fungspraxis
   
2011
  Erich Schmidt Verlag  
  id87   Schmelter, Heinrich
IT-Unterst├╝tzung f├╝r Interne Revision und Wirtschaftspr├╝fung
Praxisleitfaden zur Optimierung von Pr├╝fungsplanung, -durchf├╝hrung und -dokumentation
   
2010
  Erich Schmidt Verlag  
  dv93   Kargel, Herbert
Controlling im DV-Bereich
   
1994
  R. Oldenbourg Verlag  
  dv104   ISACA
COBIT 3rd edition
Der international anerkannte Standard f├╝r IT-Governance
   
2001
  Bitterli Consulting AG  
  dv090   Coopers & Lybrand L.L.P.
Professional Practices Pamphlet 97-1
   
1997
  The Institut of Internal Auditor  
  dv92   Kargl, Herbert
Controlling im DV-Bereich
   
1993
  R. Oldenbourg Verlag  
  id68   Wagener, Marie-Luise
Praxisleitfaden f├╝r SAP R/3 FI
Pr├╝fung der Ordnungsm├Ą├čigkeit der Finanzbuchhaltung in SAP R/3 Systemen
   
2004
  Ottokar Schreiber Verlag GmbH  
  id67   Lanza, Richard B.
Proctively Detecting Occupational Fraud Using Computer Audit Reports
   
2004
  The IIA Research Foundation  
  ir108   Roth, James
Adding Value: Seven Roads to Success
   
2002
  The Institute of Internal Auditors  
  id53   Lauterbach, Andrea
Revision im Informationsmanagement
   
1999
  Wissenschaft & Praxis  
  ID 93   Holtstiege, J.; K├Âster, C.; Ribbert, M.; Ridder, T.
Microsoft Dynamics NAV 2009
Gesch├Ąftsprozesse richtig abbilden Ein praxisorientierter Compliance-Leitfaden
   
2009
  Microsoft Press Deutschland  
  id12   Parker, Xeniy Ley
AN e.RISK PRIMER
   
2001
  The Institute of Internal Auditors  
  id41   Marcella, Stone, Sampias
Electronic Commerce:
Control Issues For Securing Virtual Enterprises
   
1998
  The Institute of Internal Auditors  
  id31   By Coppers & Lybrand L.L.P.
SAP R/3: Its use, control and audit
   
1997
  Auditors Research foundation  
  id24   Marcella, Albert J. Jr.
www.STOPTHIEF.net
Protecting Your Identity on the Web
   
1999
  The Institute of Internal Auditors  
  ID005   Fischer, Thomas
Die Gestalt. d. internen Kontrolle bei elektron. DV
Anforderungen aus der Sicht des Abschlusspr├╝fers
    1976    
  ID015   Sch├Ąfer, Hans-Thomas, in: Horvath, Peter (Hrsg.)
Revision bei Datenbanksystemen
    1980   stmv  
  ID013   Mair/Wood/Davis
Computer-Control and Audit
    1978   IIA  
  ID009   Martien├č, R├╝diger
Sachlogische Programmpr├╝fung
Untersuchungen zur EDV-Programmpr├╝fungsdurchf├╝hrung bei Anwendung der 'sachlogischen Programmpr├╝fungsmethode'..
    1977   R&T-Verlag  
  ID007   Hessisches Institut f├╝r BW (Hrsg.)
Rechnungswesen Revision Automation
    0   Mnemoton-Verlag  
  ID001   Institute of Internal Auditors (Hrsg.)
Internal Auditing of Electronic Data Processing Systems
    0    
  ID025   K├Âlbel/Mrachacz
Revision und Wirtschaftspr├╝fung bei EDV
    0   Verlag Moderne Industrie  
  ID035   Ward/Marshall (Hrsg.)
Recommended Codes and Practices for the Audit of Data..
..Processing Activities
    1980   IIA  
  IR042   Wittmann, Alois
Systempr├╝fung und ergebnisorientierte Pr├╝fung
Die Systempr├╝fung als Grundlage der ergebnisorientiert. Pr├╝fung im Rahmen d. akt.-rechtl. Jahresabschlusspr├╝fung
    1981   Erich Schmidt Verlag  
  IR043   The Institute of Internal Auditors
Systems Auditability & Control Study
    1977   -  
  ID038   Gloor, Bruno
Die Ber├╝cksichtigung der Revisionsanforderungen in...
...der EDV-Systementwicklung
    1985   Schweizerische Treuhand-und...  
  ID047   Schuppenhauer, Rainer
Grunds├Ątze und Methoden der EDV-Pr├╝fung
    1987   IDW-Verlag  
  ID045   Schuppenhauer, Rainer
Checklisten f├╝r die EDV-Pr├╝fung
    1985   IDW-Verlag  
  ID044   Rausch, Helmar
Grunds├Ątze ordnungsm├Ą├čiger EDV-Dokumentation
M├Âglichkeiten ihrer maschinellen Erf├╝llung und Konsequenzen f├╝r die Pr├╝fungsdurchf├╝hrung
    1985   RT Verlag  
  ID043   Eschen, Hans-J├╝rgen, in: Martien├č, R├╝diger (Hrsg.)
M├Âglichkeiten der Pr├╝fung von EDV-Buchf├╝hrungssystemen
...im Rahmen der Jahresabschlusspr├╝fung
    1985   RT Verlag  
  ID048   Gloor, Bruno
Die Ber├╝cksichtigung der Revisionsanforderungen in...
...der EDV-Systementwicklung
    1985   Schweizerische Treuhand-und...  
  ID037   Wirtschaftsvereinig. Eisen-u. Stahlindustrie D├╝sseldorf
Richtlinien f├╝r die Revision EDV
    1960   Betriebswirtsch. Ausschuss  
  ID034   K├Âster, Heinrich
Computer-gest├╝tzte Pr├╝fungsmethoden
    1974   IDW Verlag  
  ID032   Lindemann/Nagel
Revision und Kontrolle bei automatisierter DV
    1973   Luchterhand Verlag  
  ID056   Hanisch/Kempf
Revision u. Kontrolle von EDV-Anwendungen im Rechnungswesen
    1990   Verlag C.H. Beck  
  ID060   Rainer Tappert
EDV-System-Pr├╝fung
Bankbetriebliche Revisionsinformatik
    1994   Bank-Verlag GmbH  
  ID054   Siemens AG (Hrsg.)
Elektron. Datenverarbeitung aus d. Sicht d. Revision
      Siemens, Abt. ├ľffentlichkeitsarbeit  
  ID050   Swart, Christoph
Systempr├╝fung
in verteilten Abrechnungssystemen unter besonderer...
    1988   IDW-Verlag  
  ID058   Kirchberg-Lennartz, Barbara
Pr├╝fbarkeit von EDV-Systemen
    1991   Erich Schmidt Verlag  
  ID004   Bundesministerium f. Wirtschaft u. Finanzen (Hrsg.)
Merkblatt f├╝r die Pr├╝fung v. Rechnungswerken, die...
    1972    
  sch7   Deutsches Institut f├╝r Interne Revision e.V. (Hrsg.)
Revision der EDV
Kommentierte Pr├╝fungsfragen f├╝r die Revisionspraxis
    1982   Erich Schmidt Verlag  
  sch6   Deutsches Institut f├╝r Interne Revision e.V. (Hrsg.)
Revision der EDV
Kommentierte Pr├╝fungsfragen f├╝r die Revisionspraxis
    1975   Erich Schmidt Verlag  
  sch5   Ballmann, Wilhelm (Hrsg.)
Revision der EDV
Kommentierte Revisionsfragebogen mit optimalen Soll- darstellungen
    1969   Erich Schmidt Verlag  
  sch4   Ballmann, Wilhelm (Hrsg.)
Revision der EDV
Kommentierte Revisionsfragebogen mit optimalen Soll- darstellungen
    1969   Erich Schmidt Verlag