Libros > IT Auditing : Using Controls to Protect Information Assets (Ebook)
Portada de It Auditing : Using Controls to Protect Information Assets (ebook)

It Auditing : Using Controls to Protect Information Assets (ebook)

Autores:Davis, Chris; Schiller, Mike; Wheeler, Kevin; VV.AA.;
Categoría:
ISBN: EB9780072263435
McGraw-Hill Digital nos ofrece It Auditing : Using Controls to Protect Information Assets (ebook) en inglés, disponible en nuestra tienda desde el 01 de Enero del 2011. Este libro cuenta con un total de 344 páginas .
Leer argumento »
Ver todas las novedades de libros »

Argumento de It Auditing : Using Controls to Protect Information Assets (ebook)

Protect Your Systems with Proven IT Auditing Strategies

"A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.

Build and maintain an IT audit function with maximum effectiveness and value

  • Implement best practice IT audit processes and controls
  • Analyze UNIX-, Linux-, and Windows-based operating systems
  • Audit network routers, switches, firewalls, WLANs, and mobile devices
  • Evaluate entity-level controls, data centers, and disaster recovery plans
  • Examine Web servers, platforms, and applications for vulnerabilities
  • Review databases for critical controls
  • Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
  • Implement sound risk analysis and risk management practices
  • Drill down into applications to find potential control weaknesses
0" Part I: Audit Overview Chapter 1. Building an Effective Internal IT Audit Function Chapter 2. The Audit Process Part II: Auditing Techniques Chapter 3. Auditing Entity-Level Controls Chapter 4. Auditing Data Centers and Disaster Recovery Chapter 5. Auditing Switches, Routers, and Firewalls Chapter 6. Auditing Windows Operating Systems Chapter 7. Auditing Unix and Linux Operating Systems Chapter 8. Auditing Web Servers Chapter 9. Auditing Databases Chapter 10. Auditing Applications Chapter 11. Auditing WLAN and Mobile Devices Chapter 12. Auditing Company Projects Part III: Frameworks, Standards, and Regulations Chapter 13. Frameworks and Standards Chapter 14. Regulations Chapter 15: Risk Management Index"
Ultimacomic es una marca registrada por Ultimagame S.L - Ultimacomic.com y Ultimagame.com pertenecen a la empresa Ultimagame S.L - Datos Fiscales: B92641216 - Datos de Inscripción Registral: Inscrita en el Registro Mercantíl de Málaga, TOMO: 3815. LIBRO: 2726. FOLIO: 180. HOJA: MA-77524.
2003 - 2019, COPYRIGHT ULTIMAGAME S.L. - Leer esta página significa estar deacuerdo con la Política de privacidad y de uso