IT Auditing Using Controls to Protect Information Assets, 2nd Edition
Table of Contents

Interested in seeing the entire table of contents?

Program Details

Part I: Audit Overview; Chapter 1. Building an Effective Internal IT Audit Function; Chapter 2. The Audit Process; Part II: Auditing Techniques; Chapter 3. Auditing Entity-Level Controls; Chapter 4. Auditing Data Centers and Disaster Recovery; Chapter 5. Auditing Routers, Switches, and Firewalls; Chapter 6. Auditing Windows Operating Systems; Chapter 7. Auditing Unix and Linux Operating Systems; Chapter 8. Auditing Web Servers and Web Applications; Chapter 9. Auditing Databases; Chapter 10. Auditing Storage; Chapter 11. Auditing Virtualized Environments; Chapter 12. Auditing WLAN and Mobile Devices; Chapter 13. Auditing Applications; Chapter 14. Auditing Cloud Computing and Outsourced Operations; Chapter 15. Auditing Company Projects; Part III: Frameworks, Standards, and Regulations; Chapter 16. Frameworks and Standards; Chapter 17. Regulations; Chapter 18. Risk Management; Index