IT Auditing: Using Controls to Protect Information Assets

IT Auditing: Using Controls to Protect Information Assets
Author :
Publisher : McGraw Hill Professional
Total Pages : 417
Release :
ISBN-10 : 9780071631761
ISBN-13 : 0071631763
Rating : 4/5 (763 Downloads)

Book Synopsis IT Auditing: Using Controls to Protect Information Assets by : Chris Davis

Download or read book IT Auditing: Using Controls to Protect Information Assets written by Chris Davis and published by McGraw Hill Professional. This book was released on 2007-01-12 with total page 417 pages. Available in PDF, EPUB and Kindle. Book excerpt: Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value Implement best practice IT audit processes and controls Analyze UNIX-, Linux-, and Windows-based operating systems Audit network routers, switches, firewalls, WLANs, and mobile devices Evaluate entity-level controls, data centers, and disaster recovery plans Examine Web servers, platforms, and applications for vulnerabilities Review databases for critical controls Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies Implement sound risk analysis and risk management practices Drill down into applications to find potential control weaknesses


IT Auditing: Using Controls to Protect Information Assets Related Books

IT Auditing: Using Controls to Protect Information Assets
Language: en
Pages: 417
Authors: Chris Davis
Categories: Computers
Type: BOOK - Published: 2007-01-12 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco
IT Auditing Using Controls to Protect Information Assets, Third Edition
Language: en
Pages: 577
Authors: Chris Davis
Categories: Computers
Type: BOOK - Published: 2019-10-04 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect I
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
Language: en
Pages: 513
Authors: Chris Davis
Categories: Computers
Type: BOOK - Published: 2011-02-05 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect I
Information Technology Control and Audit, Fifth Edition
Language: en
Pages: 514
Authors: Angel R. Otero
Categories: Computers
Type: BOOK - Published: 2018-07-27 - Publisher: CRC Press

DOWNLOAD EBOOK

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, incl
Network Security Auditing
Language: en
Pages: 700
Authors: Chris Jackson
Categories: Computers
Type: BOOK - Published: 2010-06-02 - Publisher: Cisco Press

DOWNLOAD EBOOK

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and techn