Skip to content

IT Auditing: Using Controls to Protect Information Assets

Best in textbook rentals since 2012!

ISBN-10: 0072263431

ISBN-13: 9780072263435

Edition: 2007

Authors: Chris Davis, Mike Schiller, Kevin Wheeler

List price: $59.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Based on real-world implementations, this volume provides a tested framework for planning and performing an effective internal IT audit program. It includes full coverage of the latest auditing tools, plus ready-to-use checklists and templates.
Customers also bought

Book details

List price: $59.99
Copyright year: 2007
Publisher: McGraw-Hill Osborne
Publication date: 12/22/2006
Binding: Paperback
Pages: 387
Size: 7.75" wide x 9.25" long x 1.00" tall
Weight: 1.496
Language: English

David Cowen, CISSP, is coauthor of the previous bestselling editions of Hacking Exposed Computer Forensics and Anti-Hacker Toolkit, Third Edition. He is a Partner at G-C Partners, LLC where he provides expert witness services and consulting to Fortune 500 companies nationwide.Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.

Author Profiles Chris Davis, CISA, CISSP, CCNPserved as a senior IT auditor for Texas Instruments, where he worked on worldwide teams in security architecture, design and product management. Mr. Davis has trained and presented in information security, advanced computer forensic analysis, and hardware security design for corporate and government organizations and conferences. He actively teaches auditing and certification curriculum for Southern Methodist University.Mike Schiller, CISA (Dallas, TX), has 15 years of experience in the IT audit field, most recently as the worldwide IT Audit Manager at Texas Instruments (TI).Kevin Wheeler, CISSP, CISA, NSA IAM/IEM (Carrollton, TX), is the…    

Audit Overview
Building an Effective Internal IT Audit Function
The Audit Process
Auditing Techniques
Auditing Entity-Level Controls
Auditing Data Centers and Disaster Recovery
Auditing Switches, Routers, and Firewalls
Auditing Windows Operating Systems
Auditing Unix and Linux Operating Systems
Auditing Web Servers
Auditing Databases
Auditing Applications
Auditing WLAN and Mobile Devices
Auditing Company Projects
Frameworks, Standards, and Regulations
Frameworks and Standards
Regulations
Risk Management
Index
Table of Contents provided by Publisher. All Rights Reserved.