IT auditing : using controls to protect information assets /
Kegerreis, Mike,
IT auditing : using controls to protect information assets / Mike Kegerreis, Mike Schiller, and Chris Davis with Brian Wrozek. - Third edition. - xix, 553 pages : illustrations ; 24 cm.
Includes bibliographical references and index.
Part I. Audit overview -- Building an effective internal IT audit function -- The Audit process -- Part II. Auditing techniques -- Auditing entity-level controls -- Auditing cybersecurity programs -- Auditing data centers and disaster recovery -- Auditing networking devices -- Auditing windows servers -- Auditing Unix and Linux operating systems -- Auditing web servers and web applications -- Auditing databases -- Auditing big data and data repositories -- Auditing storage -- Auditing virtualized environments -- Auditing end-user computing devices -- Auditing applications -- Auditing cloud computing and outsourced operations -- Auditing company projects -- Auditing new/other technologies -- Part III. Frameworks, standards, regulations, and risk management -- Frameworks and standards -- Regulations -- Risk management.
Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- Edited summary from book
9781260453225
2019910394
Electronic data processing--Auditing.
Information technology--Management.
Computer networks--Security measures.
Computer security.
QA76.9.A93
657.458 / K259i
IT auditing : using controls to protect information assets / Mike Kegerreis, Mike Schiller, and Chris Davis with Brian Wrozek. - Third edition. - xix, 553 pages : illustrations ; 24 cm.
Includes bibliographical references and index.
Part I. Audit overview -- Building an effective internal IT audit function -- The Audit process -- Part II. Auditing techniques -- Auditing entity-level controls -- Auditing cybersecurity programs -- Auditing data centers and disaster recovery -- Auditing networking devices -- Auditing windows servers -- Auditing Unix and Linux operating systems -- Auditing web servers and web applications -- Auditing databases -- Auditing big data and data repositories -- Auditing storage -- Auditing virtualized environments -- Auditing end-user computing devices -- Auditing applications -- Auditing cloud computing and outsourced operations -- Auditing company projects -- Auditing new/other technologies -- Part III. Frameworks, standards, regulations, and risk management -- Frameworks and standards -- Regulations -- Risk management.
Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- Edited summary from book
9781260453225
2019910394
Electronic data processing--Auditing.
Information technology--Management.
Computer networks--Security measures.
Computer security.
QA76.9.A93
657.458 / K259i