Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Building an Effective Internal IT Audit Function
Figure 1-1: Audit committee board of directors
Figure 1-2: Potential auditing subject areas.
Chapter 2: The Audit Process
Figure 2-1: Types of internal controls and their implementation.
Figure 2-2: Example audit ranking table.
Figure 2-3: Audit process overview.
Figure 2-4: Audit process overview-planning stage.
Figure 2-5: Audit process overview-fieldwork and documentation stage.
Figure 2-6: Audit process overview-issue discovery and validation stage.
Figure 2-7: Audit process overview-solution development stage.
Figure 2-8: Audit process overview-report drafting and issuance stage.
Figure 2-9: Audit process overview-issue-tracking stage.
Chapter 4: Auditing Data Centers and Disaster Recovery
Figure 4-1: Data-processing hierarchy.
Chapter 6: Auditing Windows Operating Systems
Figure 6-1: Auditing hosts model.
Figure 6-2: Retina scanner.
Chapter 7: Auditing Unix and Linux Operating Systems
Figure 7-1: Unix permissions.
Chapter 11: Auditing WLAN and Mobile Devices
Figure 11-1: Example WLAN architecture.
Figure 11-2: Service provider illustration.
Figure 11-3: Network Stumbler in action.
Chapter 13: Frameworks and Standards
Figure 13-1: COSO cube.
Figure 13-2: Expanded COSO cube.
Figure 13-3: CoBIT framework.
Figure 13-4: IT Governance Institute maturity scale.
Figure 13-5: IT Governance Institute maturity model for internal control.
Figure 13-6: CoBIT-COSO relationships.
Chapter 15: Risk Management
Figure 15-1: Risk-management life cycle.
Figure 15-2: Business function decomposition.
Figure 15-4: Risk-management process.
Figure 15-3: Credit card process diagram.
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Filtering for Null Values
Using Manual Transactions
Creating an XML File That Shows Changes Made to a DataSet
Improving Performance While Filling a DataSet
Adding Tables to a Database
Developing Tablet PC Applications (Charles River Media Programming)
Introduction to Visual Basic .NET
Creating an MP3 Player
Power Management for the Tablet PC
Not Quite a Magic Ball
Tablet Fax
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an InfoCube
Checking Data Quality
Operational Data Store (ODS)
Generic R/3 Data Extraction
Appendix B. SAP Basis Overview
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
Comparing, Designing, and Deploying VPNs
Summary
Implementing Advanced AToM Features
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
IPsec: A Security Architecture for IP
Review Questions
MPLS Configuration on Cisco IOS Software
Basic MPLS VPN Overview and Configuration
Option 4: Non-VPN Transit Provider
Carrier Supporting Carriers
MPLS QoS Operating Modes
Case Study 9: Implementing VPLS Services with the GSR 12000 Series
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies