Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Building an Effective Internal IT Audit Function
Figure 1-1: Audit committee board of directors
Figure 1-2: Potential auditing subject areas.
Chapter 2: The Audit Process
Figure 2-1: Types of internal controls and their implementation.
Figure 2-2: Example audit ranking table.
Figure 2-3: Audit process overview.
Figure 2-4: Audit process overview-planning stage.
Figure 2-5: Audit process overview-fieldwork and documentation stage.
Figure 2-6: Audit process overview-issue discovery and validation stage.
Figure 2-7: Audit process overview-solution development stage.
Figure 2-8: Audit process overview-report drafting and issuance stage.
Figure 2-9: Audit process overview-issue-tracking stage.
Chapter 4: Auditing Data Centers and Disaster Recovery
Figure 4-1: Data-processing hierarchy.
Chapter 6: Auditing Windows Operating Systems
Figure 6-1: Auditing hosts model.
Figure 6-2: Retina scanner.
Chapter 7: Auditing Unix and Linux Operating Systems
Figure 7-1: Unix permissions.
Chapter 11: Auditing WLAN and Mobile Devices
Figure 11-1: Example WLAN architecture.
Figure 11-2: Service provider illustration.
Figure 11-3: Network Stumbler in action.
Chapter 13: Frameworks and Standards
Figure 13-1: COSO cube.
Figure 13-2: Expanded COSO cube.
Figure 13-3: CoBIT framework.
Figure 13-4: IT Governance Institute maturity scale.
Figure 13-5: IT Governance Institute maturity model for internal control.
Figure 13-6: CoBIT-COSO relationships.
Chapter 15: Risk Management
Figure 15-1: Risk-management life cycle.
Figure 15-2: Business function decomposition.
Figure 15-4: Risk-management process.
Figure 15-3: Credit card process diagram.
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Master Test Planning
Test Implementation
Some Final Thoughts…
Appendix F Process Diagrams
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
VoIP
How Packets Match a List Entry
Snapshot DDR
Encrypted Tunnels
Logging
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Working with Sections
Fundamentals of a Notes Application
How to Add Text to a Rich Text Object
Assign One Rich Text Object to Another Rich Text Object
Refreshing All Documents
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Unauthorized Activity II
Tcpdump
Cisco Secure IDS
Incident Response
Special Edition Using Crystal Reports 10
Exploring the Format Editor Dialog Common Options
Performance Monitoring and Tuning
Crystal Enterprise Architecture Overview
Understanding Network Protocols
Creating Schedulable Program Objects
Java Concurrency in Practice
Safe Publication
Task Cancellation
Stopping a Thread-based Service
Costs Introduced by Threads
Using Condition Queues
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies