Protect Your Systems with Proven IT Auditing Strategies
"A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
Build and maintain an IT audit function with maximum effectiveness and value
"synopsis" may belong to another edition of this title.
Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.
Mike Schiller, CISA (Dallas, TX) is the worldwide IT audit manager at Texas Instruments.
Kevin Wheeler, CISSP, CISA, NSA IAM/IEM (Carrollton, TX) is the founder and CEO of InfoDefense.
Protect Your Systems with Proven IT Auditing Strategies
Plan for and manage an effective IT audit program using the in-depth
information contained in this comprehensive resource. Written by
experienced IT audit and security professionals, IT Auditing: Using
Controls to Protect Information Assets covers the latest auditing tools
alongside real-world examples, ready-to-use checklists, and valuable
templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux
systems; secure databases; examine wireless networks and devices; and audit
applications. Plus, you'll get up-to-date information on legal standards
and practices, privacy and ethical issues, and the CobiT standard.
Build and maintain an IT audit function with maximum effectiveness and
value
Implement best practice IT audit processes and controls
Analyze UNIX-, Linux-, and Windows-based operating systems
Audit network routers, switches, firewalls, WLANs, and mobile devices
Evaluate entity-level controls, data centers, and disaster recovery plans
Examine Web servers, platforms, and applications for vulnerabilities
Review databases for critical controls
Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
Implement sound risk analysis and risk management practices
Drill down into applications to find potential control weaknesses
"About this title" may belong to another edition of this title.
Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00098022091
Seller: Greenworld Books, Arlington, TX, U.S.A.
Condition: good. Fast Free Shipping â" Good condition. It may show normal signs of use, such as light writing, highlighting, or library markings, but all pages are intact and the book is fully readable. A solid, complete copy that's ready to enjoy. Seller Inventory # GWV.0072263431.G
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_397219018
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0072263431I3N00
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR004693715
Quantity: 1 available
Seller: Bookbot, Prague, Czech Republic
Softcover. Condition: As New. Leichte Abnutzungen. Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value. Seller Inventory # 79811220-36cc-4a91-88b8-e00885c122ce
Quantity: 1 available
Seller: YESIBOOKSTORE, MIAMI, FL, U.S.A.
paperback. Condition: As New. Seller Inventory # 0072263431-VB
Seller: BennettBooksLtd, Los Angeles, CA, U.S.A.
paperback. Condition: New. In shrink wrap. Looks like an interesting title! Seller Inventory # Q-0072263431
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 1st edition. 387 pages. 9.25x7.75x1.00 inches. In Stock. Seller Inventory # 0072263431
Quantity: 1 available