Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
.
Default
.
PageMenu
-
Main Menu
-
Member Services
.
Purchase Suggestion
.
Exit Webopac
.
Search Menu
Simple Search
.
Advanced Search
.
Clear Search Sets
.
Refine Search Results
.
.
FOS Childrens Library
.
New Items Search
.
Bottom Menu
Help
About
.
Map
.
Exit Webopac
.
Languages
English
.
German
.
New Items Menu
New Items Search
.
New Items List
.
.................................
EBOOK CENTRAL
.
SCIENCE DIRECT (BUSINESS)
.
MASADER
.
UNWTO
.
SCOPUS
.
E-JOURNALS
.
DATABASE INFO. SYSTEM (DBIS)
.
LIBRARY WEBSITE
.
© LIBERO v6.4.1sp211215
Purchase at amazon.co.uk
.
Purchase at bookstore
.
Purchase at google
.
Page content
You are here
:
Catalogue Display
Catalogue Display
IT auditing: using controls to protect information assets
.
About the Author
.
.
LibraryThing
.
.
Google Books
.
.
Amazon Books
.
Browse Shelf
Catalogue Record 16550
.
Item Information
Catalogue Record 16550
.
Catalogue Information
Catalogue Record 16550
.
Reviews
Catalogue Record 16550
.
Share Link
Jump to link
Item Information
Barcode
Shelf Location
Collection
Volume Ref.
Branch
Status
Due Date
Res.
10036696
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036697
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036698
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036699
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036700
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036701
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036702
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036703
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
10036704
QC100.K44 2020
Computer Science
GUtech Library
.
.
Available
.
Select this item
Download Title
Catalogue Record 16550
Export
This Record
As
Labelled Format
Bibliographic Format
ISBD Format
MARC Format
MARC Binary Format
MARCXML Format
To
File
Email
Reserve Title
Catalogue Record 16550
.
Catalogue Record 16550 ItemInfo
Beginning of record
.
Catalogue Record 16550 ItemInfo
Top of page
.
Catalogue Information
Field name
Details
ISBN
9781260453225
1260453227
Language
E
Shelf Location
QC100.K44 2020
Author
Kegerreis, M.
Title
IT auditing : using controls to protect information assets
3rd ed.
Publisher
New York : McGraw-Hill Education , 2020
Description
xxi, 553 pages : ill. ; 23 cm
Specific Type of Material
Book
Explains, step by step, how to implement a successful, enterprise-wide IT audit program ... This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered.
Contents
Part 1. Audit overview. Building an effective internal IT audit function ; The audit process Part 2. Auditing techniques. Auditing entity-level controls ; Auditing cybersecurity programs ; Auditing data centers and disaster recovery ; Auditing networking devices ; Auditing Windows servers ; Auditing Unix and Linux operating systems ; Auditing web servers and web applications ; Auditing databases ; Auditing big data and data repositories; Auditing storage ; Auditing virtualized environments ; Auditing end-user computing devices ; Auditing applications ; Auditing cloud computing and outsourced operations ; Auditing company projects ; Auditing new/other technologies.Part 3. Frameworks, standards, regulations, and risk management. Frameworks and standards ; Regulations ; Risk management.
Subject
Computer networks Security measures
Computer security
Information Audit
Other name(s)
Schiller, M.
Davis, C.
Wrozek, B.
Links to Related Works
Subject References:
Computer networks Security measures
.
Computer security
.
Information Audit
.
Authors:
Davis, C.
.
Kegerreis, M.
.
Schiller, M.
.
Wrozek, B.
.
.
Enriched Content
Catalogue Record 16550
.
ISBD Display
Catalogue Record 16550
.
Tag Display
Catalogue Record 16550
.
Related Works
Catalogue Record 16550
.
Marc XML
Catalogue Record 16550
.
Add Title to Basket
Catalogue Record 16550
.
Catalogue Information 16550
Beginning of record
.
Catalogue Information 16550
Top of page
.
Most Read Titles
#
Author
Title
1
.
Weinschenk, Susan
1
.
100 things every designer needs to know about people
1
2
.
Murdock, Kelly
2
.
3ds max 9.
2
3
.
Anderson, Andy
3
.
Brilliant Photoshop CS3: What you need to know and how to do it
3
4
.
Kurose, James F.
4
.
Computer Networking: A top-down approach.
4
5
.
Freeman, Eric
5
.
Head first design patterns. A brain-friendly guide.
5
.
As well of interest
#
Author
Title
1
.
Connolly, Thomas
1
.
Database Systems. A Practical Approach to Design, Implementation and Management.
1
2
.
Barakat, Nahla H.
2
.
Intelligible support vector machines for diagnosis of diabetes mellitus.
2
3
.
S. Rawal,Bharat
3
.
Cybersecurity and Identity Access Management
3
4
.
Al Habsi, Mohammed Hilal
4
.
Freelance website
4
.
Reviews
This item has not been rated.
Add a Review and/or Rating
16550
1
16550
-
2
16550
-
3
16550
-
4
16550
-
5
16550
-