000 | 03263cam a2200325 a 4500 | ||
---|---|---|---|
001 | 14592421 | ||
003 | APU | ||
005 | 20150818155954.0 | ||
008 | 061012s2007 njua b 001 0 eng | ||
010 | _a 2006033470 | ||
020 | _a9789833655472 (pbk.) | ||
020 | _a109833655475 (pbk.) | ||
035 | _a(OCoLC)ocm72988400 | ||
035 | _a(OCoLC)72988400 | ||
040 |
_aDLC _cDLC _dNEDA _dWAN _beng |
||
050 | 0 | 0 |
_aQA76.9.A25 _bI54 2006 |
082 | 0 | 0 |
_a005.8 _222 _bINF 2006 |
245 | 1 | 0 |
_aAuditor's guide to information systems auditing / _cRichard E. Cascarino. |
260 |
_aPetaling Jaya , Selangor. : _bPrentice Hall. : _cc2006. |
||
300 |
_axiii, 348 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments. | |
650 | 0 |
_aInformation technology security _913729 |
|
856 | 4 | 1 |
_3Table of contents only _uhttp://www.loc.gov/catdir/toc/ecip072/2006033470.html |
856 | 4 | 2 |
_3Contributor biographical information _uhttp://www.loc.gov/catdir/enhancements/fy0741/2006033470-b.html |
856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/enhancements/fy0741/2006033470-d.html |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBook _01 |
||
999 |
_c7480 _d7480 |