Language: English
Published by McGraw-Hill Education, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: Gulf Coast Books, Cypress, TX, U.S.A.
perfect. Condition: Good.
Language: English
Published by McGraw-Hill Education, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: Orion Tech, Kingwood, TX, U.S.A.
perfect. Condition: Good.
Language: English
Published by McGraw-Hill Education, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Language: English
Published by McGraw-Hill Education (edition 2), 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: BooksRun, Philadelphia, PA, U.S.A.
Perfect Paperback. Condition: Fair. 2. The item might be beaten up but readable. May contain markings or highlighting, as well as stains, bent corners, or any other major defect, but the text is not obscured in any way.
Language: English
Published by McGraw-Hill Education, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: HPB-Red, Dallas, TX, U.S.A.
Perfect Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Language: English
Published by McGraw-Hill Education, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: Bay State Book Company, North Smithfield, RI, U.S.A.
Condition: very_good.
Language: English
Published by McGraw-Hill Education, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Unknown. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: Greenworld Books, Arlington, TX, U.S.A.
Condition: good. Fast Free Shipping â" Good condition. It may show normal signs of use, such as light writing, highlighting, or library markings, but all pages are intact and the book is fully readable. A solid, complete copy that's ready to enjoy.
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: Bookbot, Prague, Czech Republic
Softcover. Condition: As New. Leichte Abnutzungen. Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Language: English
Published by McGraw-Hill Education, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Language: English
Published by McGraw-Hill Education, OH, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls and cybersecurity programs Assess data centers and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Review big data and data repositories Assess end user computer devices, including PCs and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications and projects to find potential control weaknesses Learn best practices for auditing new technologies Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Language: English
Published by McGraw-Hill Osborne Media, 2011
ISBN 10: 0071742387 ISBN 13: 9780071742382
Seller: Revaluation Books, Exeter, United Kingdom
Perfect Paperback. Condition: Brand New. 2nd edition. 512 pages. 9.00x7.00x1.00 inches. In Stock.
Language: English
Published by McGraw-Hill Education, US, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
Paperback. Condition: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.
Language: English
Published by McGraw-Hill Education 2019-09-30, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: YESIBOOKSTORE, MIAMI, FL, U.S.A.
paperback. Condition: As New.
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: BennettBooksLtd, Los Angeles, CA, U.S.A.
paperback. Condition: New. In shrink wrap. Looks like an interesting title!
Language: English
Published by McGraw-Hill Education, OH, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls and cybersecurity programs Assess data centers and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Review big data and data repositories Assess end user computer devices, including PCs and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications and projects to find potential control weaknesses Learn best practices for auditing new technologies Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Über den AutorrnrnnChris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.nInhaltsverzeichnisPART 1: Audit Overvi.
Language: English
Published by McGraw-Hill Education, US, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Seller: Rarewaves.com UK, London, United Kingdom
Paperback. Condition: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.
Language: English
Published by McGraw-Hill Osborne Media, 2006
ISBN 10: 0072263431 ISBN 13: 9780072263435
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 1st edition. 387 pages. 9.25x7.75x1.00 inches. In Stock.
Language: English
Published by McGraw-Hill Osborne Media, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 3rd edition. 553 pages. 9.00x7.25x1.00 inches. In Stock. This item is printed on demand.
Language: English
Published by McGraw-Hill Education, OH, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Seller: AussieBookSeller, Truganina, VIC, Australia
Paperback. Condition: new. Paperback. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls and cybersecurity programs Assess data centers and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Review big data and data repositories Assess end user computer devices, including PCs and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications and projects to find potential control weaknesses Learn best practices for auditing new technologies Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices This item is printed on demand. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.