IT auditing : using controls to protect information assets / Chris Davis
Material type: TextPublication details: Tata Mc Graw Hill, New Delhi : 2007Description: 395 pISBN:- 0070647682
- 005.8 D2611
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | UE-Central Library | 005.8 D2611 (Browse shelf(Opens below)) | Available | T1641 |
Browsing UE-Central Library shelves Close shelf browser (Hides shelf browser)
005.8 B7569 Security of mobile communications | 005.8 C1533 Security+ guide to network security fundamental | 005.8 C75211 Principles of computer security : | 005.8 D2611 IT auditing : using controls to protect information assets | 005.8 E374 Understanding and applying cryptography and data security | 005.8 El591 The Internet security guidebook : | 005.8 F126 Software hacking |
includes index
*Audit overview
1. Building an effective internal it audit function
2. The audit process
*Auditing techniques
3. Auditing entity level controls
4. Auditing data centers and disaster recovery
5. Auditing switches, routers, and firewalls
6. Auditing windows operating systems
7. Auditing unix and linux operating systems
8. Auditing web servers
9. Auditing databases
10. Auditing applications
11. Auditing wlan and mobile devices
12. Auditing company projects
*Framework, standards and regulations
13. Framworks and standards
14. Regulations
15. Risk management
There are no comments on this title.