Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Building an Effective Internal IT Audit Function
Figure 1-1: Audit committee board of directors
Figure 1-2: Potential auditing subject areas.
Chapter 2: The Audit Process
Figure 2-1: Types of internal controls and their implementation.
Figure 2-2: Example audit ranking table.
Figure 2-3: Audit process overview.
Figure 2-4: Audit process overview-planning stage.
Figure 2-5: Audit process overview-fieldwork and documentation stage.
Figure 2-6: Audit process overview-issue discovery and validation stage.
Figure 2-7: Audit process overview-solution development stage.
Figure 2-8: Audit process overview-report drafting and issuance stage.
Figure 2-9: Audit process overview-issue-tracking stage.
Chapter 4: Auditing Data Centers and Disaster Recovery
Figure 4-1: Data-processing hierarchy.
Chapter 6: Auditing Windows Operating Systems
Figure 6-1: Auditing hosts model.
Figure 6-2: Retina scanner.
Chapter 7: Auditing Unix and Linux Operating Systems
Figure 7-1: Unix permissions.
Chapter 11: Auditing WLAN and Mobile Devices
Figure 11-1: Example WLAN architecture.
Figure 11-2: Service provider illustration.
Figure 11-3: Network Stumbler in action.
Chapter 13: Frameworks and Standards
Figure 13-1: COSO cube.
Figure 13-2: Expanded COSO cube.
Figure 13-3: CoBIT framework.
Figure 13-4: IT Governance Institute maturity scale.
Figure 13-5: IT Governance Institute maturity model for internal control.
Figure 13-6: CoBIT-COSO relationships.
Chapter 15: Risk Management
Figure 15-1: Risk-management life cycle.
Figure 15-2: Business function decomposition.
Figure 15-4: Risk-management process.
Figure 15-3: Credit card process diagram.
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Getting Started
Reverse Engineering and Importing to ORM
Generating a Physical Database Schema
Editing Logical Models”Advanced Aspects
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 2 Diagnosing and Troubleshooting
Domain 1 Operating System Fundamentals
Domain 3 Diagnosing and Troubleshooting
Domain 4 Networks
Documenting Software Architectures: Views and Beyond
Overview
Combined Views
Discussion Questions
C4ISR Architecture Framework
ECS Software Architecture View Template
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Procedures
Bit Manipulation
The Assembly Process
Appendix E 80x86 Instructions (by Opcode)
DNS & BIND Cookbook
Checking Whether a Domain Name Is Registered
Pointing a Domain Name to a Particular URL
Using Multiple Data Files for a Single Zone
Restarting a Name Server with the Same Arguments
Discarding a Category of Messages
Digital Character Animation 3 (No. 3)
Design Styles
Conclusion
Animating with Poses
Acting Technique
Other Techniques
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies