IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler.
Material type:
- 9780071742399
- 005.8 22
- QA76.9.A93 .K44 2020.
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
Zetech Library - Mang'u Campus General Stacks | Non-fiction | QA76.9.A93 .K44 2020 (Browse shelf(Opens below)) | C1 | Available | Z011560 | ||
![]() |
Zetech Library - Ruiru Campus General Stacks | Non-fiction | QA76.9.A93 .K44 2020 (Browse shelf(Opens below)) | C2 | Available | z011559 |
Browsing Zetech Library - Mang'u Campus shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
No cover image available No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9.A43 .W36 2023 Data structures and algorithms : 100 interview questions / | QA76.9.A73 .B37 2022 Software architecture in practice / | QA76.9.A73 .H46 2007 Computer architecture : a quantitative approach / | QA76.9.A93 .K44 2020 IT auditing : using controls to protect information assets / | QA76.9.B45 .B49 2021 Big data analytics for Internet of things | QA76.9 .B45 .M36 2022 Data science ethics : concepts, techniques and cautionary tales / | QA76.9.D26 .C66 2015 Database systems: a practical approach to design, implementation, and management / |
Includes bibliographical references and index.
PART 1: Audit Overview--Chapter 1: Building an Effective Internal IT Audit Function--Chapter 2: The Audit Process--PART 2: Auditing Techniques--Chapter 3: Auditing Entity-Level Controls--Chapter 4: Auditing Cybersecurity Programs--Chapter 5: Auditing Data Centers and Disaster Recovery--Chapter 6: Auditing Networking Devices--Chapter 7: Auditing Windows Operating Systems--Chapter 8: Auditing Unix and Linux Operating Systems--Chapter 9: Auditing Web Servers and Web Applications--Chapter 10: Auditing Databases--Chapter 11: Auditing Big Data and Data Repositories--Chapter 12: Auditing Storage--Chapter 13: Auditing Virtualized Environments--Chapter 14: Auditing End User Computing Devices--Chapter 15: Auditing Applications--Chapter 16: Auditing Cloud Computing and Outsourced Operations--Chapter 17: Auditing Company Projects--Chapter 18: Auditing New/Other Technologies--PART 3: Frameworks, Standards, and Regulations--Chapter 19: Standards and Frameworks--Chapter 20: Regulations--Chapter 21: Risk Management.
There are no comments on this title.