Nicht aus der Schweiz? Besuchen Sie lehmanns.de
IT Auditing: Using Controls to Protect Information Assets - Chris Davis, Mike Schiller, Kevin Wheeler

IT Auditing: Using Controls to Protect Information Assets

Buch | Softcover
387 Seiten
2007
McGraw-Hill Professional (Verlag)
978-0-07-226343-5 (ISBN)
CHF 66,30 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Offering details on systematic procedures for IT audits, this book provides a tested framework for planning and performing an internal IT audit program. It includes coverage of the auditing tools, as well as ready-to-use checklists and templates.
Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.

Build and maintain an IT audit function with maximum effectiveness and value



Implement best practice IT audit processes and controls
Analyze UNIX-, Linux-, and Windows-based operating systems
Audit network routers, switches, firewalls, WLANs, and mobile devices
Evaluate entity-level controls, data centers, and disaster recovery plans
Examine Web servers, platforms, and applications for vulnerabilities
Review databases for critical controls
Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
Implement sound risk analysis and risk management practices
Drill down into applications to find potential control weaknesses

Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics. Mike Schiller, CISA (Dallas, TX) is the worldwide IT audit manager at Texas Instruments. Kevin Wheeler, CISSP, CISA, NSA IAM/IEM (Carrollton, TX) is the founder and CEO of InfoDefense.

Part I: Audit OverviewChapter 1. Building an Effective Internal IT Audit Function Chapter 2. The Audit Process Part II: Auditing TechniquesChapter 3. Auditing Entity-Level Controls Chapter 4. Auditing Data Centers and Disaster Recovery Chapter 5. Auditing Switches, Routers, and Firewalls Chapter 6. Auditing Windows Operating Systems Chapter 7. Auditing Unix and Linux Operating Systems Chapter 8. Auditing Web Servers Chapter 9. Auditing Databases Chapter 10.Auditing Applications Chapter 11.Auditing WLAN and Mobile Devices Chapter 12.Auditing Company Projects Part III: Frameworks, Standards, and RegulationsChapter 13.Frameworks and StandardsChapter 14.Regulations Chapter 15: Risk ManagementIndex

Erscheint lt. Verlag 16.2.2007
Zusatzinfo 20 Illustrations, unspecified
Sprache englisch
Maße 188 x 231 mm
Gewicht 670 g
Themenwelt Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
ISBN-10 0-07-226343-1 / 0072263431
ISBN-13 978-0-07-226343-5 / 9780072263435
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
eine anwendungsorientierte Einführung

von Klaus Backhaus; Bernd Erichson; Sonja Gensler

Buch | Softcover (2023)
Springer Gabler (Verlag)
CHF 69,95