Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

IT auditing : using controls to protect information assets /

Davis, Chris

IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler. - 3rd ed. - New York : McGraw-Hill, 2020. - xxi, 553 p.: ill., 24cm.

Includes bibliographical references and index.

PART 1: Audit Overview--Chapter 1: Building an Effective Internal IT Audit Function--Chapter 2: The Audit Process--PART 2: Auditing Techniques--Chapter 3: Auditing Entity-Level Controls--Chapter 4: Auditing Cybersecurity Programs--Chapter 5: Auditing Data Centers and Disaster Recovery--Chapter 6: Auditing Networking Devices--Chapter 7: Auditing Windows Operating Systems--Chapter 8: Auditing Unix and Linux Operating Systems--Chapter 9: Auditing Web Servers and Web Applications--Chapter 10: Auditing Databases--Chapter 11: Auditing Big Data and Data Repositories--Chapter 12: Auditing Storage--Chapter 13: Auditing Virtualized Environments--Chapter 14: Auditing End User Computing Devices--Chapter 15: Auditing Applications--Chapter 16: Auditing Cloud Computing and Outsourced Operations--Chapter 17: Auditing Company Projects--Chapter 18: Auditing New/Other Technologies--PART 3: Frameworks, Standards, and Regulations--Chapter 19: Standards and Frameworks--Chapter 20: Regulations--Chapter 21: Risk Management.

9780071742399

2020755127


Electronic data processing--Auditing.
Information auditing.
Computer security.
Computer networks--Security measures.

QA76.9.A93 / .K44 2020.

005.8