IT Auditing Using Controls to Protect Information Assets, 2nd Edition https://www.mheducation.com/cover-images/Jpeg_250-high/0071742387.jpeg
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

IT Auditing Using Controls to Protect Information Assets, 2nd Edition

2nd Edition

Purchase Options

We’re committed to providing you with high-value course solutions backed by great service and a team that cares about your success.

Product


ISBN10: 0071742387 | ISBN13: 9780071742382

$72.00

The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.

Program Details

Part I: Audit Overview; Chapter 1. Building an Effective Internal IT Audit Function; Chapter 2. The Audit Process; Part II: Auditing Techniques; Chapter 3. Auditing Entity-Level Controls; Chapter 4. Auditing Data Centers and Disaster Recovery; Chapter 5. Auditing Routers, Switches, and Firewalls; Chapter 6. Auditing Windows Operating Systems; Chapter 7. Auditing Unix and Linux Operating Systems; Chapter 8. Auditing Web Servers and Web Applications; Chapter 9. Auditing Databases; Chapter 10. Auditing Storage; Chapter 11. Auditing Virtualized Environments; Chapter 12. Auditing WLAN and Mobile Devices; Chapter 13. Auditing Applications; Chapter 14. Auditing Cloud Computing and Outsourced Operations; Chapter 15. Auditing Company Projects; Part III: Frameworks, Standards, and Regulations; Chapter 16. Frameworks and Standards; Chapter 17. Regulations; Chapter 18. Risk Management; Index