IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller, Kevin Wheeler.
Material type: TextPublication details: New York : McGraw-Hill 2007. Description: xxvii, 387 p. : ill. ; 24 cmISBN: 9780072263435Subject(s): Electronic data processing -- Auditing | Information auditing | Computer security | Computer networks -- Security measuresLOC classification: QA76.9.A93 | D38 2007Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | CUE LIBRARY QA MATHEMATICS | QA76.9.A93 D38 2007 (Browse shelf(Opens below)) | Available | 2018-0240 |
Browsing CUE LIBRARY shelves, Shelving location: QA MATHEMATICS Close shelf browser (Hides shelf browser)
QA76.25 .F57 1982 Computer Programming in COBOL/ | QA76 .76 2011 Analysis and Design of Information Systems/ | QA76.8.I2594 S27 1984 The IBM personal computer from the inside out / | QA76.9.A93 D38 2007 IT auditing : using controls to protect information assets / | QA76.9.D26 L46 1992 Database design theory / | QA76.9.D3 K736 2007 Database concepts / | QA76.9.M35 M94 1988 Equations, models, and programs : a mathematical introduction to computer science / |
Includes bibliographical references and index.
Pt. I. Audit review -- Building an effective internal IT audit function -- The audit process -- Pt. II. Auditing techniques -- Auditing entity-level controls -- Auditing data centers and disaster recovery -- Auditing switches, routers, and firewalls -- Auditing Windows operating systems -- Auditing UNIX and Linux operating systems -- Auditing web servers -- Auditing databases -- Auditing applications -- Auditing WLAN and mobile devices -- Auditing company projects -- Pt. III. Frameworks, standards, and regulations -- Frameworks and standards -- Regulations -- Risk management.
There are no comments on this title.