IT Auditing Using Controls to Protect Information Assets, 2nd Edition

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
Title IT Auditing Using Controls to Protect Information Assets, 2nd Edition PDF eBook
Author Chris Davis
Publisher McGraw Hill Professional
Pages 513
Release 2011-02-05
Genre Computers
ISBN 0071742395

Download IT Auditing Using Controls to Protect Information Assets, 2nd Edition Book in PDF, Epub and Kindle

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices

IT Auditing: Using Controls to Protect Information Assets

IT Auditing: Using Controls to Protect Information Assets
Title IT Auditing: Using Controls to Protect Information Assets PDF eBook
Author Chris Davis
Publisher McGraw Hill Professional
Pages 417
Release 2007-01-12
Genre Computers
ISBN 0071631763

Download IT Auditing: Using Controls to Protect Information Assets Book in PDF, Epub and Kindle

Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value Implement best practice IT audit processes and controls Analyze UNIX-, Linux-, and Windows-based operating systems Audit network routers, switches, firewalls, WLANs, and mobile devices Evaluate entity-level controls, data centers, and disaster recovery plans Examine Web servers, platforms, and applications for vulnerabilities Review databases for critical controls Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies Implement sound risk analysis and risk management practices Drill down into applications to find potential control weaknesses

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition
Title IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition PDF eBook
Author Chris Davis
Publisher
Pages 512
Release 2011
Genre
ISBN

Download IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition Book in PDF, Epub and Kindle

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices.

IT Auditing Using Controls to Protect Information Assets, Third Edition

IT Auditing Using Controls to Protect Information Assets, Third Edition
Title IT Auditing Using Controls to Protect Information Assets, Third Edition PDF eBook
Author Mike Kegerreis
Publisher McGraw Hill Professional
Pages 576
Release 2019-09-30
Genre Computers
ISBN 1260453235

Download IT Auditing Using Controls to Protect Information Assets, Third Edition Book in PDF, Epub and Kindle

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. • Build and maintain an internal IT audit function with maximum effectiveness and value • Audit entity-level controls and cybersecurity programs • Assess data centers and disaster recovery • Examine switches, routers, and firewalls • Evaluate Windows, UNIX, and Linux operating systems • Audit Web servers and applications • Analyze databases and storage solutions • Review big data and data repositories • Assess end user computer devices, including PCs and mobile devices • Audit virtualized environments • Evaluate risks associated with cloud computing and outsourced operations • Drill down into applications and projects to find potential control weaknesses • Learn best practices for auditing new technologies • Use standards and frameworks, such as COBIT, ITIL, and ISO • Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI • Implement proven risk management practices

IT Auditing

IT Auditing
Title IT Auditing PDF eBook
Author Mike Kegerreis
Publisher
Pages 0
Release 2019
Genre Computer networks
ISBN

Download IT Auditing Book in PDF, Epub and Kindle

Accounting Information Systems

Accounting Information Systems
Title Accounting Information Systems PDF eBook
Author Leslie Turner
Publisher John Wiley & Sons
Pages 592
Release 2020-01-02
Genre Business & Economics
ISBN 1119577837

Download Accounting Information Systems Book in PDF, Epub and Kindle

Accounting Information Systems provides a comprehensive knowledgebase of the systems that generate, evaluate, summarize, and report accounting information. Balancing technical concepts and student comprehension, this textbook introduces only the most-necessary technology in a clear and accessible style. The text focuses on business processes and accounting and IT controls, and includes discussion of relevant aspects of ethics and corporate governance. Relatable real-world examples and abundant end-of-chapter resources reinforce Accounting Information Systems (AIS) concepts and their use in day-to-day operation. Now in its fourth edition, this popular textbook explains IT controls using the AICPA Trust Services Principles framework—a comprehensive yet easy-to-understand framework of IT controls—and allows for incorporating hands-on learning to complement theoretical concepts. A full set of pedagogical features enables students to easily comprehend the material, understand data flow diagrams and document flowcharts, discuss case studies and examples, and successfully answer end-of-chapter questions. The book’s focus on ease of use, and its straightforward presentation of business processes and related controls, make it an ideal primary text for business or accounting students in AIS courses.

Surviving Security

Surviving Security
Title Surviving Security PDF eBook
Author Amanda Andress
Publisher CRC Press
Pages 529
Release 2003-12-18
Genre Computers
ISBN 1135491631

Download Surviving Security Book in PDF, Epub and Kindle

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions. About the Author Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.