Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Building an Effective Internal IT Audit Function
Figure 1-1: Audit committee board of directors
Figure 1-2: Potential auditing subject areas.
Chapter 2: The Audit Process
Figure 2-1: Types of internal controls and their implementation.
Figure 2-2: Example audit ranking table.
Figure 2-3: Audit process overview.
Figure 2-4: Audit process overview-planning stage.
Figure 2-5: Audit process overview-fieldwork and documentation stage.
Figure 2-6: Audit process overview-issue discovery and validation stage.
Figure 2-7: Audit process overview-solution development stage.
Figure 2-8: Audit process overview-report drafting and issuance stage.
Figure 2-9: Audit process overview-issue-tracking stage.
Chapter 4: Auditing Data Centers and Disaster Recovery
Figure 4-1: Data-processing hierarchy.
Chapter 6: Auditing Windows Operating Systems
Figure 6-1: Auditing hosts model.
Figure 6-2: Retina scanner.
Chapter 7: Auditing Unix and Linux Operating Systems
Figure 7-1: Unix permissions.
Chapter 11: Auditing WLAN and Mobile Devices
Figure 11-1: Example WLAN architecture.
Figure 11-2: Service provider illustration.
Figure 11-3: Network Stumbler in action.
Chapter 13: Frameworks and Standards
Figure 13-1: COSO cube.
Figure 13-2: Expanded COSO cube.
Figure 13-3: CoBIT framework.
Figure 13-4: IT Governance Institute maturity scale.
Figure 13-5: IT Governance Institute maturity model for internal control.
Figure 13-6: CoBIT-COSO relationships.
Chapter 15: Risk Management
Figure 15-1: Risk-management life cycle.
Figure 15-2: Business function decomposition.
Figure 15-4: Risk-management process.
Figure 15-3: Credit card process diagram.
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Java I/O
ProgressMonitorInputStream
Versioning
JFileChooser
Files
The Java Bluetooth API
Agile Project Management: Creating Innovative Products (2nd Edition)
Practice: Product Architecture
Envision Summary
Practice: Feature Cards
Individual Performance
Practice: Product, Project, and Team Review and Adaptive Action
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.4 How to Generate a Key Using PuTTY
Conclusion
Postfix: The Definitive Guide
Unix Topics
Email Topics
Local Mail Transfer Protocol
Delivery to Commands
Postfix and SASL
802.11 Wireless Networks: The Definitive Guide, Second Edition
The Radio Link
Frequency-Hopping PMD Sublayer
1X on the AirPort
Improving Performance
Current Trends in Wireless Networking
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Programming Research Services
Working with the Application Object
Working with the Range Object
VSTO Extensions to Word and Excel Objects
Creating Application-Level Smart Tags
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies