IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
Delivery: Can be download Immediately after purchasing
Version: PDF. If you need EPUB and MOBI Version, please contact us.
Compatible Devices: Can be read on any devices (Kindle, NOOK, Android/IOS devices, Windows, MAC)
Quality: High Quality. No missing contents. Printable
ISBN-13:Â 9780071742382
Original price was: $39.40.$24.49Current price is: $24.49.
38% Off
Secure Payments
Pay with the worlds payment methods.
Discount Available
Covers payment and purchase gifts.
100% Money-Back Guarantee
Need Help?
(484) 414-5835
Share Our Wines With Your Friends & Family
Description
Editorial Reviews: IT Auditing Using Controls to Protect Information Assets
About the Author
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Secure Your Systems Using the Latest IT Auditing Techniques
Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsource operations, virtualization, and storage are include. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also cover in this definitive resource.
- Build and also maintain an internal IT audit function with maximum effectiveness and value
- Audit entity-level controls, data centers, and also the disaster recovery
- Examine switches, routers, and also firewalls
- Evaluate Windows, UNIX, and also Linux operating systems
- Audit Web servers and also applications
- Analyze databases and also storage solutions
- Assess WLAN and mobile devices
- Audit virtualized environments
- Evaluate risks associated with cloud computing and outsourced operations
- Drill down into applications to find potential control weaknesses
- Use standards and frameworks, such as COBIT, ITIL, and ISO
- Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI
- Implement proven risk management practices
Buy online IT Auditing Using Controls to Protect Information Assets from nextskillup.com.
Additional information
Formats |
---|
OUR BEST COLLECTION OF COURSES AND BOOKS
Reviews
There are no reviews yet.