eBooks-it.org Logo
eBooks-IT.org Inner Image

IT Auditing

Using Controls to Protect Information Assets

2nd Edition
IT Auditing Image

Book Details:

Publisher:McGraw-Hill Osborne Media
Series: McGraw Hill , Using
Author:Chris Davis
Edition:2
ISBN-10:0071742387
ISBN-13:9780071742382
Pages:512
Published:Jan 10 2011
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:7.75 MB

Book Description:

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices

Download Link:

Related Books:

The Code Book

How to Make It, Break It, Hack It, Crack It
The Code Book Image
It is known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history's most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War, Simon Singh follows the evolution of secret writing. Accessible, compelling, and timely, this international bestseller, now adapted for young people, is sure to make readers see the past and the future - in a whole new way....

CMOS Electronics

How It Works, How It Fails
CMOS Electronics Image
CMOS manufacturing environments are surrounded with symptoms that can indicate serious test, design, or reliability problems, which, in turn, can affect the financial as well as the engineering bottom line. This book educates readers, including non-engineers involved in CMOS manufacture, to identify and remedy these causes. This book instills the electronic knowledge that affects not just design but other important areas of manufacturing such as test, reliability, failure analysis, yield-quality issues, and problems.Designed specifically for the many non-electronic engineers employed in the semiconductor industry who need to reliably manufacture chips at a high rate in large quantities, this is a practical guide to how CMOS electronics work, how fail...

Implementing IT Governance

A Practical Guide to Global Best Practices in IT Management
Implementing IT Governance Image
The issues, opportunities and challenges of aligning information technology more closely with an organization and effectively governing an organizations Information Technology (IT) investments, resources, major initiatives and superior uninterrupted service is becoming a major concern of the Board and executive management in enterprises on a global basis. An integrated and comprehensive approach to the alignment, planning, execution and governance of IT and its resources has become critical to more effectively align, integrate, invest, measure, deploy, service and sustain the strategic and tactical direction and value proposition of IT in support of organizations....



2007 - 2021 © eBooks-IT.org