Logo
FULIOPAC 

FOUNDATION UNIVERSITY LIBRARY INTEGRATED ONLINE PUBLIC ACCESS CATALOG

 Home  About Us   Libraries   Services  AI (Artificial Intelligence)  FULELR   FULOG-InS  CoRe   e-Books e-Resources  Databases   Gale Complete  Gender&Development  Thesis/Dissertation   BP/Capstone/FS   DigiLib   Lists   CourseReserves   FilOnline  

IT auditing : using controls to protect information assets /

Kegerreis, Mike

IT auditing : using controls to protect information assets / by Mike Kegerreis, Chris Davis, Mike Schiller, Brian Wrozek - Third edition - New York : McGraw-Hill, 2020 - xxi, 553 pages : illustrations ; 23 cm.

Tables.

Includes index.

PART 1: Audit Overview Chapter 1: Building an Effective Internal IT Audit Function Chapter 2: The Audit Process PART 2: Auditing Techniques Chapter 3: Auditing Entity-Level Controls Chapter 4: Auditing Cybersecurity Programs Chapter 5: Auditing Data Centers and Disaster Recovery Chapter 6: Auditing Networking Devices Chapter 7: Auditing Windows Operating Systems Chapter 8: Auditing Unix and Linux Operating Systems Chapter 9: Auditing Web Servers and Web Applications Chapter 10: Auditing Databases Chapter 11: Auditing Big Data and Data Repositories Chapter 12: Auditing Storage Chapter 13: Auditing Virtualized Environments Chapter 14: Auditing End User Computing Devices Chapter 15: Auditing Applications Chapter 16: Auditing Cloud Computing and Outsourced Operations Chapter 17: Auditing Company Projects Chapter 18: Auditing New/Other Technologies PART 3: Frameworks, Standards, and Regulations Chapter 19: Standards and Frameworks Chapter 20: Regulations Chapter 21: Risk Management

9781260453225


Computer Security.
Computer networks --Security measures.
Electronic data processing Auditing.
Information technology --Management.

005.8 / 005.8 K259 2020