logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

It Auditing Using Controls To Protect Information Assets 1st Edition Chris Davis

  • SKU: BELL-974878
It Auditing Using Controls To Protect Information Assets 1st Edition Chris Davis
$ 31.00 $ 45.00 (-31%)

5.0

50 reviews

It Auditing Using Controls To Protect Information Assets 1st Edition Chris Davis instant download after payment.

Publisher: McGraw-Hill Osborne Media
File Extension: CHM
File size: 3.06 MB
Pages: 387
Author: Chris Davis, Mike Schiller, Kevin Wheeler
ISBN: 9780072263435, 0072263431
Language: English
Year: 2006
Edition: 1

Product desciption

It Auditing Using Controls To Protect Information Assets 1st Edition Chris Davis by Chris Davis, Mike Schiller, Kevin Wheeler 9780072263435, 0072263431 instant download after payment.

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value * Implement best practice IT audit processes and controls * Analyze UNIX-, Linux-, and Windows-based operating systems * Audit network routers, switches, firewalls, WLANs, and mobile devices * Evaluate entity-level controls, data centers, and disaster recovery plans * Examine Web servers, platforms, and applications for vulnerabilities * Review databases for critical controls * Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies * Implement sound risk analysis and risk management practices * Drill down into applications to find potential controlweaknesses"

Related Products