IT Auditing Using Controls to Protect Information Assets 2/E

Have a Promotion Code?

Please enter it here:

Great deals and more!

Sign up for special offers, exclusive discounts, and new product announcements from McGraw-Hill Professional.

SIGN UP TODAY


Date

January 15, 2011

Format

Electronic book text, 512 pages

ISBN

0071742395 / 9780071742399

Adobe Digital Editions® is required to view your downloaded eBooks.
Click here to get Adobe Digital Editions
To learn more about eBooks please see our eBook FAQ.


If you're having problems installing due to firewall issues please go here:
http://kb2.adobe.com/cps/403/kb403051.html

$

Your Price

70.00



Overview


Main description

Fully updated to cover new technology including cloud computing, virtualization, and storage

Filled with solid techniques, checklists, forms, coverage of leading-edge tools, and systematic procedures for common IT audits, IT Auditing, Second Edition covers real-life scenarios and fosters the skills necessary for auditing complex IT systems. Fully updated to cover new technology including cloud computing, virtualization, and storage, the book provides guidance on creating an effective and value-added internal IT audit function. Information is presented in easy-to-follow sections, allowing you to quickly grasp critical and practical techniques.

The Second Edition contains updated tools and checklists, as well as discussions of key concepts and methods for their effective use. This definitive guide offers a unique combination of 'how to' information on IT auditing for new auditors, and cutting-edge audit techniques for experienced professionals.

IT Auditing, Second Edition

  • Is written by industry experts with real-world experience in auditing government, banking, and high-tech companies, including international clients
  • Covers the latest auditing tools with tips and advice on how to configure them to get the best results
  • Includes new chapters on how to audit recent technology developments, such as cloud computing, virtualization, and storage, as well as updated chapters reflecting recent technological developments
  • Provides a flexible, tested framework to use when performing IT audits

All-inclusive coverage:
Building an Effective Internal IT Audit Function; The IT Audit Process; Auditing Entity Level Controls; Auditing Data Centers and Disaster Recovery; Auditing Routers, Switches, and Firewalls; Auditing Windows Operating Systems; Auditing UNIX and Linux Operating Systems; Auditing Web Servers and Web Applications; Auditing Databases; Auditing Storage; Auditing Virtualized Environments; Auditing WLAN and Mobile Devices; Auditing Applications; Auditing Cloud Computing and Outsourced Operations; Auditing Company Projects; Standards and Frameworks; Regulations; Risk Management


Table of contents

Part I: Audit Overview; Chapter 1. Building an Effective Internal IT Audit Function; Chapter 2. The IT Audit Process; Part II: Auditing Techniques; Chapter 3. Auditing Entity Level Controls; Chapter 4. Auditing Data Centers and Disaster Recovery; Chapter 5. Auditing Routers, Switches, and Firewalls; Chapter 6. Auditing Windows Operating Systems; Chapter 7. Auditing UNIX and Linux Operating Systems; Chapter 8. Auditing Web Servers and Web Applications; Chapter 9. Auditing Databases; Chapter 10. Auditing Storage; Chapter 11. Auditing Virtualized Environments; Chapter 12. Auditing WLAN and Mobile Devices; Chapter 13. Auditing Applications; Chapter 14. Auditing Cloud Computing and Outsourced Operations; Chapter 15. Auditing Company Projects; Part III: Standards, Frameworks, and Regulations; Chapter 16. Standards and Frameworks; Chapter 17. Regulations; Chapter 18. Risk Management


Author comments

Chris Davis, CISA, CISSP, CCNP, served as a senior IT auditor for Texas Instruments. He teaches auditing and certification curriculum for Southern Methodist University and is the coauthor of Hacking Exposed: Computer Forensics and Anti-Hacker Toolkit.
Mike Schiller, CISA, has 15 years of experience in the IT audit field, most recently as the worldwide IT Audit Manager at Texas Instruments. He teaches IT auditing courses at Southern Methodist University and is a frequent speaker at IT audit and IT security conferences such as CACS and InfoSec World.
Kevin Wheeler, CISSP, CISA, NSA IAM/IEM, is the Founder and CEO of InfoDefense, an information security consultancy. He has worked with Bank of America, EDS, McAfee, and the State of Texas.





Copyright 2014 McGraw-Hill Global Education Holdings, LLC

WELCOME!

Before you can enjoy free downloads from McGraw-Hill Professional, we ask that you please provide your email address and country.



Yes, I want to receive other special offer.