IT Auditing : (Record no. 181294)

MARC details
000 -LEADER
fixed length control field 01575nam a2200337 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210118113124.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210117t20202020nyua er 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781260453225
Qualifying information paperback
Terms of availability RM245.00
040 ## - CATALOGING SOURCE
Original cataloging agency PPAK
Language of cataloging eng
Transcribing agency PPAK
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
090 00 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) 005.8
Feature heading KEG
Feature heading R
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kegerreis, Mike,
Relator term author.
245 10 - TITLE STATEMENT
Title IT Auditing :
Remainder of title Using Controls to Protect Information Assets /
Statement of responsibility, etc. Mike Kegerreis, Mike Schiller, Chris Davis with Brian Wrozek
250 ## - EDITION STATEMENT
Edition statement Third Edition
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer McGraw-Hill,
Date of production, publication, distribution, manufacture, or copyright notice 2020
Date of production, publication, distribution, manufacture, or copyright notice ©2020
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 553 pages :
Other physical details illustrations ;
Dimensions 23 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Explains, step by step, how to implement a successful, enterprise-wide IT audit program...This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered."--Publisher's description.
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing
Form subdivision Auditing
Topical term or geographic name entry element Computer networks
Form subdivision Security measures
Topical term or geographic name entry element Computer security
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schiller, Mike,
Relator term author.
Personal name Davis, Chris,
Relator term author.
Personal name Wrozek, Brian,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn Not for loan Current library Shelving location Date acquired Full call number Barcode Date last seen Koha item type
  Not For Loan Perpustakaan Alor Setar Rujukan Dewasa 09/02/2021 R 005.8 KEG A01673841 09/02/2021 Book