Description:Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.Build and maintain an IT audit function with maximum effectiveness and valueImplement best practice IT audit processes and controlsAnalyze UNIX-, Linux-, and Windows-based operating systemsAudit network routers, switches, firewalls, WLANs, and mobile devicesEvaluate entity-level controls, data centers, and disaster recovery plansExamine Web servers, platforms, and applications for vulnerabilities Review databases for critical controlsUse the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologiesImplement sound risk analysis and risk management practicesDrill down into applications to find potential control weaknessesWe have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with IT Auditing: Using Controls to Protect Information Assets. To get started finding IT Auditing: Using Controls to Protect Information Assets, you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Pages
—
Format
PDF, EPUB & Kindle Edition
Publisher
—
Release
—
ISBN
0071631763
IT Auditing: Using Controls to Protect Information Assets
Description: Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.Build and maintain an IT audit function with maximum effectiveness and valueImplement best practice IT audit processes and controlsAnalyze UNIX-, Linux-, and Windows-based operating systemsAudit network routers, switches, firewalls, WLANs, and mobile devicesEvaluate entity-level controls, data centers, and disaster recovery plansExamine Web servers, platforms, and applications for vulnerabilities Review databases for critical controlsUse the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologiesImplement sound risk analysis and risk management practicesDrill down into applications to find potential control weaknessesWe have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with IT Auditing: Using Controls to Protect Information Assets. To get started finding IT Auditing: Using Controls to Protect Information Assets, you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.