Auditor's Guide to IT Auditing (Record no. 139405)

MARC details
000 -LEADER
fixed length control field 02474nam a2200169 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221222b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118147610
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.0558
Item number CAS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Cascarino, Richard E.
9 (RLIN) 89885
245 ## - TITLE STATEMENT
Title Auditor's Guide to IT Auditing
250 ## - EDITION STATEMENT
Edition statement 2nd ed
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc John Wiley and Sons, Inc.
Date of publication, distribution, etc 2012
Place of publication, distribution, etc USA
300 ## - PHYSICAL DESCRIPTION
Extent 430p
500 ## - GENERAL NOTE
General note Part - I: IT Audit Process<br/>Technology and Audit<br/>IT Audit Function Knowledge<br/>IT Risk and Fundamental Auditing Concepts<br/>Standards and Guidelines for IT Auditing<br/>Internal Controls Concepts Knowledge<br/>Risk Management of the IT Function<br/>Audit Planning Process<br/>Audit Management<br/>Audit Evidence Process<br/>Audit Reporting Follow-Up<br/>Part – II: Information Technology Governance<br/>Management<br/>Strategic Planning<br/>Management Issues<br/>Support Tools and Frameworks<br/>Governance Techniques<br/>Part – III: Systems and Infrastructure Lifecycle Management<br/>Information Systems Planning<br/>Information Management Usage<br/>Development, Acquisition, and Maintenance of Information Systems<br/>Impact of Information Technology on the Business Processes and Solutions<br/>Software Development<br/>Audit and Control of Purchased Packages and Services<br/>Audit Role in Feasibility Studies and Conversions<br/>Audit and Development of Application Controls<br/>Part – IV: Information Technology Service Delivery and Support<br/>Technical Infrastructure<br/>Service – Centre Management<br/>Part – V: Protection of Information Assets<br/>Information Assets Security Management<br/>Logical Information Technology Security<br/>Applied Information Technology Security<br/>Physical and Environmental Security<br/>Part – VI: Business Continuity and Disaster Recovery<br/>Protection of the Information Technology Architecture and Assets: Disaster – Recovery Planning<br/>Displacement Control<br/>Part – VII: Advance IT Auditing<br/>Auditing E-Commerce Systems<br/>Auditing UNIX/LINUX<br/>Auditing Windows VISTA and Windows 7<br/>Foiling the System Hackers<br/>Preventing and investigating Information Technology Fraud<br/>Appendix – A: Ethics and Standards for the IS Auditor <br/>Appendix – B: Audit Program for Application Systems Auditing<br/>Appendix – C: Logical Access Control Audit Program<br/>Appendix – D: Audit Program for Auditing UNIX/Linux Environments<br/>Appendix – E: Audit Program for Auditing Windows VISTA and Windows 7 Environments<br/>About the Author<br/>About the Website<br/>Index
600 ## - SUBJECT ADDED ENTRY--PERSONAL NAME
Personal name Computer Engineering
9 (RLIN) 72163
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Book

No items available.

© 2025 by NIMA Knowledge Centre, Ahmedabad.
Koha version 24.05