Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics
Image from Google Jackets
Image from OpenLibrary

IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler.

By: Contributor(s): Material type: TextTextPublication details: New York : McGraw-Hill, 2020.Edition: 3rd edDescription: xxi, 553 p.: ill., 24cmISBN:
  • 9780071742399
Subject(s): Additional physical formats: Print version:: IT auditingDDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A93 .K44 2020.
Contents:
PART 1: Audit Overview--Chapter 1: Building an Effective Internal IT Audit Function--Chapter 2: The Audit Process--PART 2: Auditing Techniques--Chapter 3: Auditing Entity-Level Controls--Chapter 4: Auditing Cybersecurity Programs--Chapter 5: Auditing Data Centers and Disaster Recovery--Chapter 6: Auditing Networking Devices--Chapter 7: Auditing Windows Operating Systems--Chapter 8: Auditing Unix and Linux Operating Systems--Chapter 9: Auditing Web Servers and Web Applications--Chapter 10: Auditing Databases--Chapter 11: Auditing Big Data and Data Repositories--Chapter 12: Auditing Storage--Chapter 13: Auditing Virtualized Environments--Chapter 14: Auditing End User Computing Devices--Chapter 15: Auditing Applications--Chapter 16: Auditing Cloud Computing and Outsourced Operations--Chapter 17: Auditing Company Projects--Chapter 18: Auditing New/Other Technologies--PART 3: Frameworks, Standards, and Regulations--Chapter 19: Standards and Frameworks--Chapter 20: Regulations--Chapter 21: Risk Management.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Zetech Library - Mang'u General Stacks Non-fiction QA76.9.A93 .K44 2020 (Browse shelf(Opens below)) C1 Available Z011560
Books Books Zetech Library - TRC General Stacks Non-fiction QA76.9.A93 .K44 2020 (Browse shelf(Opens below)) C2 Available z011559

Includes bibliographical references and index.

PART 1: Audit Overview--Chapter 1: Building an Effective Internal IT Audit Function--Chapter 2: The Audit Process--PART 2: Auditing Techniques--Chapter 3: Auditing Entity-Level Controls--Chapter 4: Auditing Cybersecurity Programs--Chapter 5: Auditing Data Centers and Disaster Recovery--Chapter 6: Auditing Networking Devices--Chapter 7: Auditing Windows Operating Systems--Chapter 8: Auditing Unix and Linux Operating Systems--Chapter 9: Auditing Web Servers and Web Applications--Chapter 10: Auditing Databases--Chapter 11: Auditing Big Data and Data Repositories--Chapter 12: Auditing Storage--Chapter 13: Auditing Virtualized Environments--Chapter 14: Auditing End User Computing Devices--Chapter 15: Auditing Applications--Chapter 16: Auditing Cloud Computing and Outsourced Operations--Chapter 17: Auditing Company Projects--Chapter 18: Auditing New/Other Technologies--PART 3: Frameworks, Standards, and Regulations--Chapter 19: Standards and Frameworks--Chapter 20: Regulations--Chapter 21: Risk Management.

There are no comments on this title.

to post a comment.