- Shopping Bag ( 0 items )
Ships from: san francisco, CA
Usually ships in 1-2 business days
Protect Your Systems with Proven IT Auditing Strategies
"A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
Build and maintain an IT audit function with maximum effectiveness and value
Part I: Audit OverviewChapter 1. Building an Effective Internal IT Audit Function
Posted December 29, 2007
This is a great reviews of basic framework for comprehensive IT audits. Well explained and detailed explanations for the reason behind each control structure.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted August 22, 2007
The authors of IT Auditing provide a very good overview the process from the mapping of Financial risk to IT Risk, Overall Risk Assessment, Development of an Audit Plan, Auditing techniques, reporting, and validation. This book was very useful in my preparation for the ISACA CISA examination. I recommend this book.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.