Parameters
- 387 pages
- 14 hours of reading
More about the book
Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value
Book purchase
IT Auditing, Chris Davis, Mike Schiller, Kevin Wheeler, Michael P. Caggiano
- Language
- Released
- 2006
- product-detail.submit-box.info.binding
- (Paperback),
- Book condition
- Very Good
- Price
- €24.99
Payment methods
No one has rated yet.


