000 03263cam a2200325 a 4500
001 14592421
003 APU
005 20150818155954.0
008 061012s2007 njua b 001 0 eng
010 _a 2006033470
020 _a9789833655472 (pbk.)
020 _a109833655475 (pbk.)
035 _a(OCoLC)ocm72988400
035 _a(OCoLC)72988400
040 _aDLC
_cDLC
_dNEDA
_dWAN
_beng
050 0 0 _aQA76.9.A25
_bI54 2006
082 0 0 _a005.8
_222
_bINF 2006
245 1 0 _aAuditor's guide to information systems auditing /
_cRichard E. Cascarino.
260 _aPetaling Jaya , Selangor. :
_bPrentice Hall. :
_cc2006.
300 _axiii, 348 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 0 _aIS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments.
650 0 _aInformation technology security
_913729
856 4 1 _3Table of contents only
_uhttp://www.loc.gov/catdir/toc/ecip072/2006033470.html
856 4 2 _3Contributor biographical information
_uhttp://www.loc.gov/catdir/enhancements/fy0741/2006033470-b.html
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/enhancements/fy0741/2006033470-d.html
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBook
_01
999 _c7480
_d7480