IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler.
Material type: TextPublication details: New York : McGraw-Hill, 2020.Edition: 3rd edDescription: xxi, 553 p.: ill., 24cmISBN:- 9780071742399
- 005.8 22
- QA76.9.A93 .K44 2020.
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - Mang'u General Stacks | Non-fiction | QA76.9.A93 .K44 2020 (Browse shelf(Opens below)) | C1 | Available | Z011560 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | QA76.9.A93 .K44 2020 (Browse shelf(Opens below)) | C2 | Available | z011559 |
Browsing Zetech Library - Mang'u shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
QA76.9.A43 .L37 2021 Advance3d Algorithms and data structures: | QA76.9.A73 .B37 2022 Software architecture in practice / | QA76.9.A73 .H46 2007 Computer architecture : a quantitative approach / | QA76.9.A93 .K44 2020 IT auditing : using controls to protect information assets / | QA76.9.B45 .B49 2021 Big data analytics for Internet of things | QA76.9.D26 .C66 2015 Database systems: a practical approach to design, implementation, and management / | QA76.9.D26 .C67 2019 Database systems : design, implementation, and management / |
Includes bibliographical references and index.
PART 1: Audit Overview--Chapter 1: Building an Effective Internal IT Audit Function--Chapter 2: The Audit Process--PART 2: Auditing Techniques--Chapter 3: Auditing Entity-Level Controls--Chapter 4: Auditing Cybersecurity Programs--Chapter 5: Auditing Data Centers and Disaster Recovery--Chapter 6: Auditing Networking Devices--Chapter 7: Auditing Windows Operating Systems--Chapter 8: Auditing Unix and Linux Operating Systems--Chapter 9: Auditing Web Servers and Web Applications--Chapter 10: Auditing Databases--Chapter 11: Auditing Big Data and Data Repositories--Chapter 12: Auditing Storage--Chapter 13: Auditing Virtualized Environments--Chapter 14: Auditing End User Computing Devices--Chapter 15: Auditing Applications--Chapter 16: Auditing Cloud Computing and Outsourced Operations--Chapter 17: Auditing Company Projects--Chapter 18: Auditing New/Other Technologies--PART 3: Frameworks, Standards, and Regulations--Chapter 19: Standards and Frameworks--Chapter 20: Regulations--Chapter 21: Risk Management.
There are no comments on this title.