IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller, Kevin Wheeler.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | CUE LIBRARY QA MATHEMATICS | QA76.9.A93 D38 2007 (Browse shelf(Opens below)) | Available | 2018-0240 |
Includes bibliographical references and index.
Pt. I. Audit review -- Building an effective internal IT audit function -- The audit process -- Pt. II. Auditing techniques -- Auditing entity-level controls -- Auditing data centers and disaster recovery -- Auditing switches, routers, and firewalls -- Auditing Windows operating systems -- Auditing UNIX and Linux operating systems -- Auditing web servers -- Auditing databases -- Auditing applications -- Auditing WLAN and mobile devices -- Auditing company projects -- Pt. III. Frameworks, standards, and regulations -- Frameworks and standards -- Regulations -- Risk management.
There are no comments on this title.