12.21.2012

IT Auditing Using Controls to Protect Information Assets 2E


IT Auditing Using Controls to Protect Information Assets 2nd Edition PDF Download Ebook. Chris Davis introduces leading-edge tools and technologies to elucidate step by step, easy methods to implement a successful, enterprise-broad IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included.

This complete guide describes tips on how to assemble an efficient IT audit team and maximize the worth of the IT audit function. In-depth particulars on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and priceless templates. Standards, frameworks, laws, and risk management methods are additionally covered on this definitive resource.

This book shows tips to construct and maintain an internal IT audit perform with maximum effectiveness, worth, audit entity-degree controls, information facilities, disaster recovery, study switches, routers, firewalls, consider Windows, UNIX, and Linux working techniques, audit Net servers and purposes and analyze databases and storage solutions.

This guide also shows how one can assess WLAN and mobile units, audit virtualized environments, evaluate risks related to cloud computing and outsourced operations, drill down into purposes to search out potential control weaknesses, use standards and frameworks, corresponding to COBIT, ITIL, and ISO, perceive laws, together with Sarbanes-Oxley, HIPAA, and PCI and implement proven risk management practices.

More details about this book...

or

Download IT Auditing Using Controls to Protect Information Assets PDF Ebook :

0 comments:

Post a Comment