|
|
|
|
LEADER |
02871nam a2200229 a 4500 |
001 |
832857 |
005 |
20171111231241.0 |
008 |
061012s2007 njua b 001 0 eng |
020 |
|
|
|a 9780470009895(cloth:alk.paper)
|
040 |
|
|
|a DLC
|
050 |
0 |
0 |
|a QA76.9.A93
|b C37 2007
|
082 |
0 |
0 |
|2 22
|a 658/.0558
|
100 |
1 |
|
|a Cascarino, Richard.
|
245 |
1 |
0 |
|a Auditorʹs guide to information systems auditing /
|c Richard E. Cascarino.
|
260 |
|
|
|a Hoboken, N.J. :
|b John Wiley & Sons, Inc.,
|c c2007.
|
300 |
|
|
|a xxxiii, 474 p. :
|b ill. ;
|c 24 cm. +
|e 1 CD-ROM (4 3/4 in.)
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments.
|
650 |
|
0 |
|a Electronic data processing
|x Auditing.
|
856 |
4 |
2 |
|u http://www.loc.gov/catdir/toc/ecip072/2006033470.html
|u http://www.loc.gov/catdir/enhancements/fy0741/2006033470-b.html
|
856 |
4 |
2 |
|u http://www.loc.gov/catdir/enhancements/fy0741/2006033470-d.html
|
952 |
|
|
|a GR-AtTEI
|b 59cc78806c5ad13446fc0432
|c 998a
|d 945l
|e 658.055 8 CAS
|t 1
|x m
|z Books
|