IT Auditing: Using Controls to Protect Information Assets

IT Auditing: Using Controls to Protect Information Assets
By:Wheeler, Kevin; Schiller, Mike; Davis, Chris;
Pub Date:January 12th 2007
Format:Mixed media product 387 pages
ISBN:0071631763 / 9780071631761
Your Price:$59.99 ADD TO CART
More Information




Main description

Protect Your Systems with Proven IT Auditing Strategies

 "A must-have for auditors and IT professionals."  -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. 

Build and maintain an IT audit function with maximum effectiveness and value

  • Implement best practice IT audit processes and controls
  • Analyze UNIX-, Linux-, and Windows-based operating systems
  • Audit network routers, switches, firewalls, WLANs, and mobile devices
  • Evaluate entity-level controls, data centers, and disaster recovery plans
  • Examine Web servers, platforms, and applications for vulnerabilities
  • Review databases for critical controls
  • Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
  • Implement sound risk analysis and risk management practices
  • Drill down into applications to find potential control weaknesses


Table of contents

Part I: Audit Overview

Chapter 1. Building an Effective Internal IT Audit Function

Chapter 2. The Audit Process

Part II: Auditing Techniques

Chapter 3. Auditing Entity-Level Controls

Chapter 4. Auditing Data Centers and Disaster Recovery

Chapter 5. Auditing Switches, Routers, and Firewalls

Chapter 6. Auditing Windows Operating Systems

Chapter 7. Auditing Unix and Linux Operating Systems

Chapter 8. Auditing Web Servers

Chapter 9. Auditing Databases

Chapter 10.Auditing Applications

Chapter 11.Auditing WLAN and Mobile Devices

Chapter 12.Auditing Company Projects

Part III: Frameworks, Standards, and Regulations

Chapter 13.Frameworks and Standards

Chapter 14.Regulations

Chapter 15: Risk Management

Index


Backcover

Author Information

Downloads & Resources

Downloads



Related Products

Owl Image

Date: Mar 25th, 2016
Your Price: $20.00
Owl Image

Date: Jan 4th, 2016
Your Price: $60.00
Owl Image

Date: Nov 3rd, 2015
Your Price: $35.00
Owl Image

Date: Oct 5th, 2015
Your Price: $20.00
Owl Image

Date: Aug 3rd, 2015
Your Price: $50.00
Owl Image

Date: Jul 30th, 2015
Your Price: $50.00
Owl Image

Date: Jun 5th, 2015
Your Price: $50.00
Owl Image

Date: Jun 2nd, 2015
Your Price: $50.00
Owl Image

Date: May 11th, 2015
Your Price: $40.00
Owl Image

Date: Apr 2nd, 2015
Your Price: $25.00
Owl Image

Date: Mar 30th, 2015
Your Price: $25.00
Owl Image

Date: Mar 27th, 2015
Your Price: $25.00
Owl Image

Date: Mar 19th, 2015
Your Price: $60.00
Owl Image

Date: Mar 16th, 2015
Your Price: $60.00
Owl Image

Date: Feb 2nd, 2015
Your Price: $25.00