Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Building an Effective Internal IT Audit Function
Figure 1-1: Audit committee board of directors
Figure 1-2: Potential auditing subject areas.
Chapter 2: The Audit Process
Figure 2-1: Types of internal controls and their implementation.
Figure 2-2: Example audit ranking table.
Figure 2-3: Audit process overview.
Figure 2-4: Audit process overview-planning stage.
Figure 2-5: Audit process overview-fieldwork and documentation stage.
Figure 2-6: Audit process overview-issue discovery and validation stage.
Figure 2-7: Audit process overview-solution development stage.
Figure 2-8: Audit process overview-report drafting and issuance stage.
Figure 2-9: Audit process overview-issue-tracking stage.
Chapter 4: Auditing Data Centers and Disaster Recovery
Figure 4-1: Data-processing hierarchy.
Chapter 6: Auditing Windows Operating Systems
Figure 6-1: Auditing hosts model.
Figure 6-2: Retina scanner.
Chapter 7: Auditing Unix and Linux Operating Systems
Figure 7-1: Unix permissions.
Chapter 11: Auditing WLAN and Mobile Devices
Figure 11-1: Example WLAN architecture.
Figure 11-2: Service provider illustration.
Figure 11-3: Network Stumbler in action.
Chapter 13: Frameworks and Standards
Figure 13-1: COSO cube.
Figure 13-2: Expanded COSO cube.
Figure 13-3: CoBIT framework.
Figure 13-4: IT Governance Institute maturity scale.
Figure 13-5: IT Governance Institute maturity model for internal control.
Figure 13-6: CoBIT-COSO relationships.
Chapter 15: Risk Management
Figure 15-1: Risk-management life cycle.
Figure 15-2: Business function decomposition.
Figure 15-4: Risk-management process.
Figure 15-3: Credit card process diagram.
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Qshell for iSeries
Running Qshell
The EDTF Text Editor
Path-Name Expansion
The Perl Utility
Appendix C Qshell and CL Commands for the IFS
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 6.1 Port Forwarding
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Conclusion
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 6. Make Route Maps Easier to Read
Hack 22. Digging to China
Hack 23. Explore David Rumseys Historical Maps
Hack 54. Create Your Own Maps for a Garmin GPS
Hack 97. Set Up an OpenGuide for Your Hometown
Java Concurrency in Practice
Atomicity
Designing a Thread-safe Class
Blocking and Interruptible Methods
Executing Tasks in Threads
JVM Shutdown
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Signaling Systems
IPT
Broadband PLT
Wireless Bandwidth
Mobile Video
Understanding Digital Signal Processing (2nd Edition)
THE DFT SINGLE-BIN FREQUENCY RESPONSE TO A REAL COSINE INPUT
Chapter Five. Finite Impulse Response Filters
HALF-BAND FIR FILTERS
BILINEAR TRANSFORM IIR FILTER DESIGN METHOD
Chapter Eight. Quadrature Signals
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies