TY - BOOK AU - Davis,Chris AU - Schiller,Mike AU - Wheeler,Kevin TI - IT auditing: using controls to protect information assets SN - 9780071742399 AV - QA76.9.A93 .K44 2020. U1 - 005.8 22 PY - 2020/// CY - New York PB - McGraw-Hill KW - Electronic data processing KW - Auditing KW - Information auditing KW - Computer security KW - Computer networks KW - Security measures N1 - Includes bibliographical references and index; PART 1: Audit Overview--Chapter 1: Building an Effective Internal IT Audit Function--Chapter 2: The Audit Process--PART 2: Auditing Techniques--Chapter 3: Auditing Entity-Level Controls--Chapter 4: Auditing Cybersecurity Programs--Chapter 5: Auditing Data Centers and Disaster Recovery--Chapter 6: Auditing Networking Devices--Chapter 7: Auditing Windows Operating Systems--Chapter 8: Auditing Unix and Linux Operating Systems--Chapter 9: Auditing Web Servers and Web Applications--Chapter 10: Auditing Databases--Chapter 11: Auditing Big Data and Data Repositories--Chapter 12: Auditing Storage--Chapter 13: Auditing Virtualized Environments--Chapter 14: Auditing End User Computing Devices--Chapter 15: Auditing Applications--Chapter 16: Auditing Cloud Computing and Outsourced Operations--Chapter 17: Auditing Company Projects--Chapter 18: Auditing New/Other Technologies--PART 3: Frameworks, Standards, and Regulations--Chapter 19: Standards and Frameworks--Chapter 20: Regulations--Chapter 21: Risk Management ER -