Secure Your Systems Using the Latest IT Auditing Techniques
Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource.
• Build and maintain an internal IT audit function with maximum effectiveness and value
• Audit entity-level controls and cybersecurity programs
• Assess data centers and disaster recovery
• Examine switches, routers, and firewalls
• Evaluate Windows, UNIX, and Linux operating systems
• Audit Web servers and applications
• Analyze databases and storage solutions
• Review big data and data repositories
• Assess end user computer devices, including PCs and mobile devices
• Audit virtualized environments
• Evaluate risks associated with cloud computing and outsourced operations
• Drill down into applications and projects to find potential control weaknesses
• Learn best practices for auditing new technologies
• Use standards and frameworks, such as COBIT, ITIL, and ISO
• Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI
• Implement proven risk management practices
"synopsis" may belong to another edition of this title.
Mike Kegerreis, CISSP, is the lead information security architect at Texas Instruments and has over 20 years of experience in designing, developing, and securing IT systems.
Mike Schiller, CISA, is the chief information security officer at Texas Instruments and has more than 15 years of experience in the IT audit field, including as the IT audit director at Texas Instruments and Sabre.
Chris Davis, MBA, CISA, CISSP, CCNP, is the coauthor of Hacking Exposed Computer Forensics, Second Edition and Anti-Hacker Tool Kit, Third Edition.
Mike Schiller, CISA (Dallas, TX) is the worldwide IT audit manager at Texas Instruments.
Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.
"About this title" may belong to another edition of this title.
US$ 2.64 shipping within U.S.A.
Destination, rates & speedsSeller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Seller Inventory # 34953209-5
Quantity: 2 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_411042424
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.95. Seller Inventory # G1260453227I2N00
Quantity: 1 available
Seller: Textbooks_Source, Columbia, MO, U.S.A.
Paperback. Condition: Good. 3rd Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Seller Inventory # 002247930U
Quantity: 2 available
Seller: Campus Bookstore, Denton, TX, U.S.A.
Paperback. Condition: Good. Ships FAST! May contain highlighting/underlining/notes/etc. May have used stickers on cover. Access codes and supplements are not guaranteed to be included with used books.FA25 Ships same or next day. Expedited shipping: 3-5 business days, Standard shipping: 4-14 business days. Seller Inventory # UNTOS-FA25-ACCT5440-x-252
Quantity: 2 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 34953209-n
Quantity: Over 20 available
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. It Auditing Using Controls to Protect Information Assets, Third Edition 1.85. Book. Seller Inventory # BBS-9781260453225
Quantity: 5 available
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING. Seller Inventory # 9781260453225
Quantity: 2 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLING22Oct1111410208693
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 34953209
Quantity: Over 20 available