Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Building an Effective Internal IT Audit Function
Figure 1-1: Audit committee board of directors
Figure 1-2: Potential auditing subject areas.
Chapter 2: The Audit Process
Figure 2-1: Types of internal controls and their implementation.
Figure 2-2: Example audit ranking table.
Figure 2-3: Audit process overview.
Figure 2-4: Audit process overview-planning stage.
Figure 2-5: Audit process overview-fieldwork and documentation stage.
Figure 2-6: Audit process overview-issue discovery and validation stage.
Figure 2-7: Audit process overview-solution development stage.
Figure 2-8: Audit process overview-report drafting and issuance stage.
Figure 2-9: Audit process overview-issue-tracking stage.
Chapter 4: Auditing Data Centers and Disaster Recovery
Figure 4-1: Data-processing hierarchy.
Chapter 6: Auditing Windows Operating Systems
Figure 6-1: Auditing hosts model.
Figure 6-2: Retina scanner.
Chapter 7: Auditing Unix and Linux Operating Systems
Figure 7-1: Unix permissions.
Chapter 11: Auditing WLAN and Mobile Devices
Figure 11-1: Example WLAN architecture.
Figure 11-2: Service provider illustration.
Figure 11-3: Network Stumbler in action.
Chapter 13: Frameworks and Standards
Figure 13-1: COSO cube.
Figure 13-2: Expanded COSO cube.
Figure 13-3: CoBIT framework.
Figure 13-4: IT Governance Institute maturity scale.
Figure 13-5: IT Governance Institute maturity model for internal control.
Figure 13-6: CoBIT-COSO relationships.
Chapter 15: Risk Management
Figure 15-1: Risk-management life cycle.
Figure 15-2: Business function decomposition.
Figure 15-4: Risk-management process.
Figure 15-3: Credit card process diagram.
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
File Information
Using fork and exec Together
Ending a Process
Introduction
Key Terms and Concepts
Oracle Developer Forms Techniques
Creating a Customized Sign-on Form
Inheritance
Validation, Navigation, and Simulating Navigation
Enhancing the Function of Exit Form
Preventing Validation of WHEN-VALIDATE-ITEM for Control Items During Query Time
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 13. Choose the Right Join Style for Your Relationships
Hack 17. Solve Anagrams
Hack 54. Denormalize Your Tables
Hack 72. Extract a Subset of the Results
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Command-Line Editing Keys
Pausing Output
Asynchronous Ports (TTYs)
IP Routing Topics
Neighbor Authentication
Competency-Based Human Resource Management
Competency-Based HR Planning
Competency-Based Employee Rewards
Competency-Based HR Management The Next Steps
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Exam Prep Questions
Professional Responsibility
Exam Prep Questions
Appendix A. CD Contents and Installation Instructions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies