IT Auditing Using Controls to Protect Information Assets 2/E

Nonfiction, Computers, Application Software, Computer Security
Cover of the book IT Auditing Using Controls to Protect Information Assets 2/E by Chris Davis, Mike Schiller, Kevin Wheeler, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Chris Davis, Mike Schiller, Kevin Wheeler ISBN: 9780071742399
Publisher: McGraw-Hill Companies,Inc. Publication: January 15, 2011
Imprint: McGraw-Hill Osborne Media Language: English
Author: Chris Davis, Mike Schiller, Kevin Wheeler
ISBN: 9780071742399
Publisher: McGraw-Hill Companies,Inc.
Publication: January 15, 2011
Imprint: McGraw-Hill Osborne Media
Language: English
Fully updated to cover new technology including cloud computing, virtualization, and storage Filled with solid techniques, checklists, forms, coverage of leading-edge tools, and systematic procedures for common IT audits, IT Auditing, Second Edition covers real-life scenarios and fosters the skills necessary for auditing complex IT systems. Fully updated to cover new technology including cloud computing, virtualization, and storage, the book provides guidance on creating an effective and value-added internal IT audit function. Information is presented in easy-to-follow sections, allowing you to quickly grasp critical and practical techniques. The Second Edition contains updated tools and checklists, as well as discussions of key concepts and methods for their effective use. This definitive guide offers a unique combination of 'how to' information on IT auditing for new auditors, and cutting-edge audit techniques for experienced professionals. IT Auditing, Second Edition Is written by industry experts with real-world experience in auditing government, banking, and high-tech companies, including international clients Covers the latest auditing tools with tips and advice on how to configure them to get the best results Includes new chapters on how to audit recent technology developments, such as cloud computing, virtualization, and storage, as well as updated chapters reflecting recent technological developments Provides a flexible, tested framework to use when performing IT audits All-inclusive coverage: Building an Effective Internal IT Audit Function; The IT Audit Process; Auditing Entity Level Controls; Auditing Data Centers and Disaster Recovery; Auditing Routers, Switches, and Firewalls; Auditing Windows Operating Systems; Auditing UNIX and Linux Operating Systems; Auditing Web Servers and Web Applications; Auditing Databases; Auditing Storage; Auditing Virtualized Environments; Auditing WLAN and Mobile Devices; Auditing Applications; Auditing Cloud Computing and Outsourced Operations; Auditing Company Projects; Standards and Frameworks; Regulations; Risk Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Fully updated to cover new technology including cloud computing, virtualization, and storage Filled with solid techniques, checklists, forms, coverage of leading-edge tools, and systematic procedures for common IT audits, IT Auditing, Second Edition covers real-life scenarios and fosters the skills necessary for auditing complex IT systems. Fully updated to cover new technology including cloud computing, virtualization, and storage, the book provides guidance on creating an effective and value-added internal IT audit function. Information is presented in easy-to-follow sections, allowing you to quickly grasp critical and practical techniques. The Second Edition contains updated tools and checklists, as well as discussions of key concepts and methods for their effective use. This definitive guide offers a unique combination of 'how to' information on IT auditing for new auditors, and cutting-edge audit techniques for experienced professionals. IT Auditing, Second Edition Is written by industry experts with real-world experience in auditing government, banking, and high-tech companies, including international clients Covers the latest auditing tools with tips and advice on how to configure them to get the best results Includes new chapters on how to audit recent technology developments, such as cloud computing, virtualization, and storage, as well as updated chapters reflecting recent technological developments Provides a flexible, tested framework to use when performing IT audits All-inclusive coverage: Building an Effective Internal IT Audit Function; The IT Audit Process; Auditing Entity Level Controls; Auditing Data Centers and Disaster Recovery; Auditing Routers, Switches, and Firewalls; Auditing Windows Operating Systems; Auditing UNIX and Linux Operating Systems; Auditing Web Servers and Web Applications; Auditing Databases; Auditing Storage; Auditing Virtualized Environments; Auditing WLAN and Mobile Devices; Auditing Applications; Auditing Cloud Computing and Outsourced Operations; Auditing Company Projects; Standards and Frameworks; Regulations; Risk Management

More books from McGraw-Hill Companies,Inc.

Cover of the book The Canadian Guide to Will and Estate Planning: Everything You Need to Know Today to Protect Your Wealth and Your Family Tomorrow 3E by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book HVAC Equations, Data, and Rules of Thumb, 2nd Ed. by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Practice Makes Perfect The French Subjunctive Up Close by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book 38 - Theory of Constraints for Personal Productivity Dilemmas by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Calculus Demystified 2/E by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 10 - Analyze Phase by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Practice Make Perfect French Vocabulary by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Six Sigma Business Scorecard, Chapter 10 - Adapting the Six Sigma Business Scorecard to Small Businesses by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Lean Six Sigma for Supply Chain Management, Chapter 3 - Demand Management Impact on Lean Six Sigma Projects by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book The McGraw-Hill Homeland Security Handbook : The Definitive Guide for Law Enforcement, EMT, and all other Security Professionals: The Definitive Guide for Law Enforcement, EMT, and all other Security Professionals by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book PowerShell for Microsoft SharePoint 2010 Administrators by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 5 - How to Determine, Analyze, and Interpret Your Samples by Chris Davis, Mike Schiller, Kevin Wheeler
Cover of the book Six Sigma Business Scorecard, Chapter 9 - Strategy for Execution by Chris Davis, Mike Schiller, Kevin Wheeler
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy