Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

IT auditing : using controls to protect information assets / Mike Kegerreis, Mike Schiller, and Chris Davis with Brian Wrozek.

By: Contributor(s): Material type: TextTextPublisher: New York : McGraw-Hill, 2020Edition: Third editionDescription: xix, 553 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781260453225
Subject(s): DDC classification:
  • 23 657.458 K259i
LOC classification:
  • QA76.9.A93
Contents:
Part I. Audit overview -- Building an effective internal IT audit function -- The Audit process -- Part II. Auditing techniques -- Auditing entity-level controls -- Auditing cybersecurity programs -- Auditing data centers and disaster recovery -- Auditing networking devices -- Auditing windows servers -- Auditing Unix and Linux operating systems -- Auditing web servers and web applications -- Auditing databases -- Auditing big data and data repositories -- Auditing storage -- Auditing virtualized environments -- Auditing end-user computing devices -- Auditing applications -- Auditing cloud computing and outsourced operations -- Auditing company projects -- Auditing new/other technologies -- Part III. Frameworks, standards, regulations, and risk management -- Frameworks and standards -- Regulations -- Risk management.
Summary: Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- Edited summary from book
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Circulation Section CIR 657.458 K259i 2020 (Browse shelf(Opens below)) 1-3 Available 028625
Books Books Main Library Circulation Section CIR 657.458 K259i 2020 (Browse shelf(Opens below)) 2-3 Available 028626
Books Books Main Library Circulation Section CIR 657.458 K259i 2020 (Browse shelf(Opens below)) 3-3 Available 029699

Includes bibliographical references and index.

Part I. Audit overview -- Building an effective internal IT audit function -- The Audit process -- Part II. Auditing techniques -- Auditing entity-level controls -- Auditing cybersecurity programs -- Auditing data centers and disaster recovery -- Auditing networking devices -- Auditing windows servers -- Auditing Unix and Linux operating systems -- Auditing web servers and web applications -- Auditing databases -- Auditing big data and data repositories -- Auditing storage -- Auditing virtualized environments -- Auditing end-user computing devices -- Auditing applications -- Auditing cloud computing and outsourced operations -- Auditing company projects -- Auditing new/other technologies -- Part III. Frameworks, standards, regulations, and risk management -- Frameworks and standards -- Regulations -- Risk management.

Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- Edited summary from book

There are no comments on this title.

to post a comment.