IT Auditing : Using Controls to Protect Information Assets / Mike Kegerreis, Mike Schiller, Chris Davis with Brian Wrozek
Publisher: New York : McGraw-Hill, 2020Copyright date: ©2020Edition: Third EditionDescription: xxi, 553 pages : illustrations ; 23 cmContent type:- text
- unmediated
- volume
- 9781260453225
- 23Â 005.8
| Item type | Current library | Collection | Shelving location | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|---|
| Book | Perpustakaan Alor Setar | RFID | Rujukan Dewasa | R 005.8 KEG (Browse shelf(Opens below)) | Not For Loan | A01673841 |
Browsing Perpustakaan Alor Setar shelves,Shelving location: Rujukan Dewasa,Collection: RFID Close shelf browser (Hides shelf browser)
| R 005.8 JAC Computer security literacy : | R 005.8 KAE Designing Network Security | R 005.8 KAH Cryptography and network security | R 005.8 KEG IT Auditing : | R 005.8 MAI Network security : | R 005.8 MAI Network security : | R 005.8 MAI Network security : |
Includes bibliographical references and index.
"Explains, step by step, how to implement a successful, enterprise-wide IT audit program...This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered."--Publisher's description.
There are no comments on this title.