McGraw-Hill Digital
Libro ebook IT Auditing : Using Controls to Protect Information Assets, Chris Davis, Mike Schiller,, Kevin Wheeler,, VV.AA.
Subtitle Using Controls to Protect Information Assets
Publisher: McGraw-Hill Digital
Categories: Trade agreements
Language: Inglés
Price in book ePub
: 53.15 (53.15)
ePub with Adobe DRM
Publishing year: 2011
Size: 7 Mb
Copy No
Printing No
ISBN: 9780072263435
FAVORITE Uncheck
BOOK DESCRIPTION
INDEX
COMMENTS
Protect Your Systems with Proven IT Auditing Strategies

 "A must-have for auditors and IT professionals."  -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. 

Build and maintain an IT audit function with maximum effectiveness and value

  • Implement best practice IT audit processes and controls
  • Analyze UNIX-, Linux-, and Windows-based operating systems
  • Audit network routers, switches, firewalls, WLANs, and mobile devices
  • Evaluate entity-level controls, data centers, and disaster recovery plans
  • Examine Web servers, platforms, and applications for vulnerabilities
  • Review databases for critical controls
  • Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
  • Implement sound risk analysis and risk management practices
  • Drill down into applications to find potential control weaknesses
"

Part I: Audit Overview

Chapter 1. Building an Effective Internal IT Audit Function

Chapter 2. The Audit Process

Part II: Auditing Techniques

Chapter 3. Auditing Entity-Level Controls

Chapter 4. Auditing Data Centers and Disaster Recovery

Chapter 5. Auditing Switches, Routers, and Firewalls

Chapter 6. Auditing Windows Operating Systems

Chapter 7. Auditing Unix and Linux Operating Systems

Chapter 8. Auditing Web Servers

Chapter 9. Auditing Databases

Chapter 10. Auditing Applications

Chapter 11. Auditing WLAN and Mobile Devices

Chapter 12. Auditing Company Projects

Part III: Frameworks, Standards, and Regulations

Chapter 13. Frameworks and Standards

Chapter 14. Regulations

Chapter 15: Risk Management

Index"

Comments about the book
Your rating:
Rating:
Comment:
To participate you need to be registered from here
Privacity | Terms website use | CONTACT
2000-2020 © Powered by Global Content Manager