Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Building an Effective Internal IT Audit Function
Figure 1-1: Audit committee board of directors
Figure 1-2: Potential auditing subject areas.
Chapter 2: The Audit Process
Figure 2-1: Types of internal controls and their implementation.
Figure 2-2: Example audit ranking table.
Figure 2-3: Audit process overview.
Figure 2-4: Audit process overview-planning stage.
Figure 2-5: Audit process overview-fieldwork and documentation stage.
Figure 2-6: Audit process overview-issue discovery and validation stage.
Figure 2-7: Audit process overview-solution development stage.
Figure 2-8: Audit process overview-report drafting and issuance stage.
Figure 2-9: Audit process overview-issue-tracking stage.
Chapter 4: Auditing Data Centers and Disaster Recovery
Figure 4-1: Data-processing hierarchy.
Chapter 6: Auditing Windows Operating Systems
Figure 6-1: Auditing hosts model.
Figure 6-2: Retina scanner.
Chapter 7: Auditing Unix and Linux Operating Systems
Figure 7-1: Unix permissions.
Chapter 11: Auditing WLAN and Mobile Devices
Figure 11-1: Example WLAN architecture.
Figure 11-2: Service provider illustration.
Figure 11-3: Network Stumbler in action.
Chapter 13: Frameworks and Standards
Figure 13-1: COSO cube.
Figure 13-2: Expanded COSO cube.
Figure 13-3: CoBIT framework.
Figure 13-4: IT Governance Institute maturity scale.
Figure 13-5: IT Governance Institute maturity model for internal control.
Figure 13-6: CoBIT-COSO relationships.
Chapter 15: Risk Management
Figure 15-1: Risk-management life cycle.
Figure 15-2: Business function decomposition.
Figure 15-4: Risk-management process.
Figure 15-3: Credit card process diagram.
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Innovative Product Development
Thriving in a Chaordic World
Practice: Participant Identification
Explore Summary
Structure and Tools
Interprocess Communications in Linux: The Nooks and Crannies
Summary
Introduction
The /proc Filesystem
Thread-Specific Data
C.2. RPC Definitions
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Detailed Test Planning
Test Implementation
The Software Tester
Improving the Testing Process
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Expense Accounting and Earned Value
Quantitative Time Management
DNS & BIND Cookbook
Storing the Location of a Host in DNS
Configuring a Name Server Not to Forward Certain Queries
Restarting a Name Server Automatically If It Dies
Delegating Reverse-Mapping for Networks with Non-Octet Masks
Handling Windows Registration with a BIND Name Server
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Numbers, Dates, and Other Data Types
Objects, Interfaces, and Patterns
XML
Windows Programming
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies