IT auditing : using controls to protect information assets / Mike Kegerreis, Mike Schiller, and Chris Davis with Brian Wrozek.
Material type:
TextPublisher: New York : McGraw-Hill, 2020Edition: Third editionDescription: xix, 553 pages : illustrations ; 24 cmContent type: - text
- unmediated
- volume
- 9781260453225
- 23 657.458 K259i
- QA76.9.A93
| Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main Library | Circulation Section | CIR 657.458 K259i 2020 (Browse shelf(Opens below)) | 1-3 | Available | 028625 | ||
Books
|
Main Library | Circulation Section | CIR 657.458 K259i 2020 (Browse shelf(Opens below)) | 2-3 | Available | 028626 | ||
Books
|
Main Library | Circulation Section | CIR 657.458 K259i 2020 (Browse shelf(Opens below)) | 3-3 | Available | 029699 |
Includes bibliographical references and index.
Part I. Audit overview -- Building an effective internal IT audit function -- The Audit process -- Part II. Auditing techniques -- Auditing entity-level controls -- Auditing cybersecurity programs -- Auditing data centers and disaster recovery -- Auditing networking devices -- Auditing windows servers -- Auditing Unix and Linux operating systems -- Auditing web servers and web applications -- Auditing databases -- Auditing big data and data repositories -- Auditing storage -- Auditing virtualized environments -- Auditing end-user computing devices -- Auditing applications -- Auditing cloud computing and outsourced operations -- Auditing company projects -- Auditing new/other technologies -- Part III. Frameworks, standards, regulations, and risk management -- Frameworks and standards -- Regulations -- Risk management.
Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- Edited summary from book
There are no comments on this title.