LEAN DEVOPS: A PRACTICAL GUIDE TO ON DEMAND SERVICE DELIVERY Original price was: ₹780.Current price is: ₹663.

Save: 15%

Back to products
INVESTIGATIVE RESEARCH Original price was: ₹995.Current price is: ₹845.

Save: 15%

IT AUDITING USING CONTROLS TO PROTECT INFORMATION ASSETS, 2ND EDITION

Publisher:
MC GRAW HILL INDIA
| Author:
C.,DAVIS
| Language:
English
| Format:
Paperback
Publisher:
MC GRAW HILL INDIA
Author:
C.,DAVIS
Language:
English
Format:
Paperback

Original price was: ₹1,795.Current price is: ₹1,525.

Save: 15%

In stock

Ships within:
7-10 Days

In stock

Book Type

Discount
Genre

Academics

ISBN:
SKU 9780071077279 Category
Category:
Page Extent:

IT Auditing provides guidance on creating an effective and value-added internal IT audit function. The book presents information in easily digestible sections, allowing the reader to quickly grasp critical and practical techniques. The book contains practical tools and checklists, as well as discussions of key concepts and methods for their effective use. It provides a unique combination of practical ‘how to’ information on IT auditing for the new auditor and cutting edge audit techniques for the experienced auditor. This edition is completely revised to address the new issues auditors are facing, and covers new technology including cloud computing and virtualization.

Key Selling Features Written by industry experts. The authors combine real-world experience in auditing government, banking, and high tech companies. Authors have experience in leading and managing international audits Contains the latest auditing tools including tips and advice on how to configure them to get the best results New chapters on how to audit recent technology developments, such as cloud computing, virtualization, and storage, as well as updating the chapters from the first edition to reflect recent technological developments Provides a flexible, tested framework for the reader to use when performing IT Audits Foreword by ISACA (Information Systems Audit and Control Association) About The Author: Chris Davis, CISA, CISSP, CCNP, served as a senior IT auditor for Texas Instruments. He teaches auditing and certification curriculum for Southern Methodist University and is the coauthor of Hacking Exposed: Computer Forensics and Anti-Hacker Toolkit. Mike Schiller, CISA, has 15 years of experience in the IT audit field, most recently as the worldwide IT Audit Manager at Texas Instruments. He teaches IT auditing courses at Southern Methodist University.

Reviews

There are no reviews yet.

Be the first to review “IT AUDITING USING CONTROLS TO PROTECT INFORMATION ASSETS, 2ND EDITION”

Your email address will not be published. Required fields are marked *

Description

IT Auditing provides guidance on creating an effective and value-added internal IT audit function. The book presents information in easily digestible sections, allowing the reader to quickly grasp critical and practical techniques. The book contains practical tools and checklists, as well as discussions of key concepts and methods for their effective use. It provides a unique combination of practical ‘how to’ information on IT auditing for the new auditor and cutting edge audit techniques for the experienced auditor. This edition is completely revised to address the new issues auditors are facing, and covers new technology including cloud computing and virtualization.

Key Selling Features Written by industry experts. The authors combine real-world experience in auditing government, banking, and high tech companies. Authors have experience in leading and managing international audits Contains the latest auditing tools including tips and advice on how to configure them to get the best results New chapters on how to audit recent technology developments, such as cloud computing, virtualization, and storage, as well as updating the chapters from the first edition to reflect recent technological developments Provides a flexible, tested framework for the reader to use when performing IT Audits Foreword by ISACA (Information Systems Audit and Control Association) About The Author: Chris Davis, CISA, CISSP, CCNP, served as a senior IT auditor for Texas Instruments. He teaches auditing and certification curriculum for Southern Methodist University and is the coauthor of Hacking Exposed: Computer Forensics and Anti-Hacker Toolkit. Mike Schiller, CISA, has 15 years of experience in the IT audit field, most recently as the worldwide IT Audit Manager at Texas Instruments. He teaches IT auditing courses at Southern Methodist University.

About Author

My name is Chris Davis. My passion for sharing knowledge has led me to create content that helps professionals navigate the complex world of cybersecurity. Whether you're an IT auditor, a security professional, or simply interested in learning more about protecting your organization's assets, I hope my books will provide you with valuable insights and practical guidance.

If you'd like to connect with me beyond the pages of my books, I invite you to visit my blog at cloudauditcontrols or connect with me on LinkedIn at christopherdavis. I'm always eager to engage with readers, share ideas, and discuss the latest developments in the field of cybersecurity.

Reviews

There are no reviews yet.

Be the first to review “IT AUDITING USING CONTROLS TO PROTECT INFORMATION ASSETS, 2ND EDITION”

Your email address will not be published. Required fields are marked *

[wt-related-products product_id="test001"]

RELATED PRODUCTS

RECENTLY VIEWED