IT auditing : using controls to protect information assets /
Kegerreis, Mike
IT auditing : using controls to protect information assets / by Mike Kegerreis, Chris Davis, Mike Schiller, Brian Wrozek - Third edition - New York : McGraw-Hill, 2020 - xxi, 553 pages : illustrations ; 23 cm.
Tables.
Includes index.
PART 1: Audit Overview Chapter 1: Building an Effective Internal IT Audit Function Chapter 2: The Audit Process PART 2: Auditing Techniques Chapter 3: Auditing Entity-Level Controls Chapter 4: Auditing Cybersecurity Programs Chapter 5: Auditing Data Centers and Disaster Recovery Chapter 6: Auditing Networking Devices Chapter 7: Auditing Windows Operating Systems Chapter 8: Auditing Unix and Linux Operating Systems Chapter 9: Auditing Web Servers and Web Applications Chapter 10: Auditing Databases Chapter 11: Auditing Big Data and Data Repositories Chapter 12: Auditing Storage Chapter 13: Auditing Virtualized Environments Chapter 14: Auditing End User Computing Devices Chapter 15: Auditing Applications Chapter 16: Auditing Cloud Computing and Outsourced Operations Chapter 17: Auditing Company Projects Chapter 18: Auditing New/Other Technologies PART 3: Frameworks, Standards, and Regulations Chapter 19: Standards and Frameworks Chapter 20: Regulations Chapter 21: Risk Management
9781260453225
Computer Security.
Computer networks --Security measures.
Electronic data processing Auditing.
Information technology --Management.
005.8 / 005.8 K259 2020
IT auditing : using controls to protect information assets / by Mike Kegerreis, Chris Davis, Mike Schiller, Brian Wrozek - Third edition - New York : McGraw-Hill, 2020 - xxi, 553 pages : illustrations ; 23 cm.
Tables.
Includes index.
PART 1: Audit Overview Chapter 1: Building an Effective Internal IT Audit Function Chapter 2: The Audit Process PART 2: Auditing Techniques Chapter 3: Auditing Entity-Level Controls Chapter 4: Auditing Cybersecurity Programs Chapter 5: Auditing Data Centers and Disaster Recovery Chapter 6: Auditing Networking Devices Chapter 7: Auditing Windows Operating Systems Chapter 8: Auditing Unix and Linux Operating Systems Chapter 9: Auditing Web Servers and Web Applications Chapter 10: Auditing Databases Chapter 11: Auditing Big Data and Data Repositories Chapter 12: Auditing Storage Chapter 13: Auditing Virtualized Environments Chapter 14: Auditing End User Computing Devices Chapter 15: Auditing Applications Chapter 16: Auditing Cloud Computing and Outsourced Operations Chapter 17: Auditing Company Projects Chapter 18: Auditing New/Other Technologies PART 3: Frameworks, Standards, and Regulations Chapter 19: Standards and Frameworks Chapter 20: Regulations Chapter 21: Risk Management
9781260453225
Computer Security.
Computer networks --Security measures.
Electronic data processing Auditing.
Information technology --Management.
005.8 / 005.8 K259 2020