Auditor's Guide to IT Auditing (Record no. 139405)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02474nam a2200169 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221222b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118147610 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.0558 |
Item number | CAS |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Cascarino, Richard E. |
9 (RLIN) | 89885 |
245 ## - TITLE STATEMENT | |
Title | Auditor's Guide to IT Auditing |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | John Wiley and Sons, Inc. |
Date of publication, distribution, etc | 2012 |
Place of publication, distribution, etc | USA |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 430p |
500 ## - GENERAL NOTE | |
General note | Part - I: IT Audit Process<br/>Technology and Audit<br/>IT Audit Function Knowledge<br/>IT Risk and Fundamental Auditing Concepts<br/>Standards and Guidelines for IT Auditing<br/>Internal Controls Concepts Knowledge<br/>Risk Management of the IT Function<br/>Audit Planning Process<br/>Audit Management<br/>Audit Evidence Process<br/>Audit Reporting Follow-Up<br/>Part – II: Information Technology Governance<br/>Management<br/>Strategic Planning<br/>Management Issues<br/>Support Tools and Frameworks<br/>Governance Techniques<br/>Part – III: Systems and Infrastructure Lifecycle Management<br/>Information Systems Planning<br/>Information Management Usage<br/>Development, Acquisition, and Maintenance of Information Systems<br/>Impact of Information Technology on the Business Processes and Solutions<br/>Software Development<br/>Audit and Control of Purchased Packages and Services<br/>Audit Role in Feasibility Studies and Conversions<br/>Audit and Development of Application Controls<br/>Part – IV: Information Technology Service Delivery and Support<br/>Technical Infrastructure<br/>Service – Centre Management<br/>Part – V: Protection of Information Assets<br/>Information Assets Security Management<br/>Logical Information Technology Security<br/>Applied Information Technology Security<br/>Physical and Environmental Security<br/>Part – VI: Business Continuity and Disaster Recovery<br/>Protection of the Information Technology Architecture and Assets: Disaster – Recovery Planning<br/>Displacement Control<br/>Part – VII: Advance IT Auditing<br/>Auditing E-Commerce Systems<br/>Auditing UNIX/LINUX<br/>Auditing Windows VISTA and Windows 7<br/>Foiling the System Hackers<br/>Preventing and investigating Information Technology Fraud<br/>Appendix – A: Ethics and Standards for the IS Auditor <br/>Appendix – B: Audit Program for Application Systems Auditing<br/>Appendix – C: Logical Access Control Audit Program<br/>Appendix – D: Audit Program for Auditing UNIX/Linux Environments<br/>Appendix – E: Audit Program for Auditing Windows VISTA and Windows 7 Environments<br/>About the Author<br/>About the Website<br/>Index |
600 ## - SUBJECT ADDED ENTRY--PERSONAL NAME | |
Personal name | Computer Engineering |
9 (RLIN) | 72163 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Item type | Book |
No items available.