IT Auditing: Using Controls to Protect Information Assets by Chris Davis (Author), Mike Schiller (Author), Kevin Wheeler (Author)
Publisher: McGraw-Hill Osborne Media; 1 edition (December 22, 2006) | ISBN-10: 0072263431 | PDF | 3,2 Mb | 387 pages
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.