Shortcuts
Please wait while page loads.
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Catalogue Display

IT auditing: using controls to protect information assets

IT auditing: using controls to protect information assets
Item Information
Barcode Shelf Location Collection Volume Ref. Branch Status Due Date Res.
10036696 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036697 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036698 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036699 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036700 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036701 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036702 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036703 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
10036704 QC100.K44 2020
Computer Science   GUtech Library . . Available .  
. Catalogue Record 16550 ItemInfo Beginning of record . Catalogue Record 16550 ItemInfo Top of page .
Catalogue Information
Field name Details
ISBN 9781260453225
1260453227
Language E
Shelf Location QC100.K44 2020
Author Kegerreis, M.
Title IT auditing : using controls to protect information assets
3rd ed.
Publisher New York : McGraw-Hill Education , 2020
Description xxi, 553 pages : ill. ; 23 cm
Specific Type of Material Book
Explains, step by step, how to implement a successful, enterprise-wide IT audit program ... This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered.
Contents Part 1. Audit overview. Building an effective internal IT audit function ; The audit process Part 2. Auditing techniques. Auditing entity-level controls ; Auditing cybersecurity programs ; Auditing data centers and disaster recovery ; Auditing networking devices ; Auditing Windows servers ; Auditing Unix and Linux operating systems ; Auditing web servers and web applications ; Auditing databases ; Auditing big data and data repositories; Auditing storage ; Auditing virtualized environments ; Auditing end-user computing devices ; Auditing applications ; Auditing cloud computing and outsourced operations ; Auditing company projects ; Auditing new/other technologies.Part 3. Frameworks, standards, regulations, and risk management. Frameworks and standards ; Regulations ; Risk management.
Subject Computer networks Security measures
Computer security
Information Audit
Other name(s) Schiller, M.
Davis, C.
Wrozek, B.
Links to Related Works
Subject References:
Authors:
Catalogue Information 16550 Beginning of record . Catalogue Information 16550 Top of page .

Reviews


This item has not been rated.    Add a Review and/or Rating16550