TY - BOOK AU - Kegerreis,Mike AU - Schiller,Mike AU - Davis,Chris AU - Wrozek,Brian TI - IT auditing: using controls to protect information assets SN - 9781260453225 AV - QA76.9.A93 U1 - 657.458 23 PY - 2020/// CY - New York PB - McGraw-Hill KW - Electronic data processing KW - Auditing KW - Information technology KW - Management KW - Computer networks KW - Security measures KW - Computer security N1 - Includes bibliographical references and index; Part I. Audit overview -- Building an effective internal IT audit function -- The Audit process -- Part II. Auditing techniques -- Auditing entity-level controls -- Auditing cybersecurity programs -- Auditing data centers and disaster recovery -- Auditing networking devices -- Auditing windows servers -- Auditing Unix and Linux operating systems -- Auditing web servers and web applications -- Auditing databases -- Auditing big data and data repositories -- Auditing storage -- Auditing virtualized environments -- Auditing end-user computing devices -- Auditing applications -- Auditing cloud computing and outsourced operations -- Auditing company projects -- Auditing new/other technologies -- Part III. Frameworks, standards, regulations, and risk management -- Frameworks and standards -- Regulations -- Risk management N2 - Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- Edited summary from book ER -