Table of Contents

it auditing: using controls to protect information assets
IT Auditing: Using Controls to Protect Information Assets
byChris Davis, Mike SchillerandKevin Wheeler
McGraw-Hill 2007 (387 pages)

Packed with real-world examples, ready-to-use checklists, and valuable templates, this comprehensive guide will help you to build and maintain an IT audit function with maximum effectiveness and value.

Table of Contents
IT Auditing-Using Controls to Protect Information Assets
Part I - Audit Overview
Chapter 1 - Building an Effective Internal IT Audit Function
Chapter 2 - The Audit Process
Part II - Auditing Techniques
Chapter 3 - Auditing Entity-Level Controls
Chapter 4 - Auditing Data Centers and Disaster Recovery
Chapter 5 - Auditing Switches, Routers, and Firewalls
Chapter 6 - Auditing Windows Operating Systems
Chapter 7 - Auditing Unix and Linux Operating Systems
Chapter 8 - Auditing Web Servers
Chapter 9 - Auditing Databases
Chapter 10 - Auditing Applications
Chapter 11 - Auditing WLAN and Mobile Devices
Chapter 12 - Auditing Company Projects
Part III - Frameworks, Standards, and Regulations
Chapter 13 - Frameworks and Standards
Chapter 14 - Regulations
Chapter 15 - Risk Management
List of Figures
List of Tables

IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
Year: 2004
Pages: 159 © 2008-2017.
If you may any questions please contact us: