Auditor's guide to information systems auditing / Richard E. Cascarino.
Material type: TextPublication details: Petaling Jaya , Selangor. : Prentice Hall. : c2006Description: xiii, 348 p. : ill. ; 24 cmISBN: 9789833655472 (pbk.); 109833655475 (pbk.)Subject(s): Information technology securityDDC classification: 005.8 LOC classification: QA76.9.A25 | I54 2006Online resources: Table of contents only | Contributor biographical information | Publisher descriptionItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APU Library Open Shelf | Book | QA76.9.A25 I54 2006 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00007239 | |
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 I54 2006 c.2 (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00007313 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 H69 2010 c.2 24 deadly sins of software security : | QA76.9.A25 H69 2010 c.3 24 deadly sins of software security : | QA76.9.A25 I54 2006 c.1 Auditor's guide to information systems auditing / | QA76.9.A25 I54 2006 c.2 Auditor's guide to information systems auditing / | QA76.9.A25 I54 2007 c.1 Information security theory and practices : | QA76.9.A25 I54 2008 c.1 Information security management principles : | QA76.9.A25 I54 2009 c.1 Information and communications security : |
Includes bibliographical references and index.
IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments.
There are no comments on this title.