| 000 | 01575nam a2200337 i 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20210118113124.0 | ||
| 008 | 210117t20202020nyua er 001 0 eng d | ||
| 020 |
_a9781260453225 _qpaperback _cRM245.00 |
||
| 040 |
_aPPAK _beng _cPPAK _erda |
||
| 082 | 0 | 4 |
_223 _a005.8 |
| 090 | 0 | 0 |
_a005.8 _bKEG _dR |
| 100 | 1 |
_aKegerreis, Mike, _eauthor. |
|
| 245 | 1 | 0 |
_aIT Auditing : _bUsing Controls to Protect Information Assets / _cMike Kegerreis, Mike Schiller, Chris Davis with Brian Wrozek |
| 250 | _aThird Edition | ||
| 264 | 1 |
_aNew York : _bMcGraw-Hill, _c2020 |
|
| 264 | 4 | _c©2020 | |
| 300 |
_axxi, 553 pages : _billustrations ; _c23 cm |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 | _a"Explains, step by step, how to implement a successful, enterprise-wide IT audit program...This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered."--Publisher's description. | ||
| 650 | 1 | 0 |
_aElectronic data processing _vAuditing |
| 650 | 2 | 0 |
_aComputer networks _vSecurity measures |
| 650 | 2 | 0 | _aComputer security |
| 700 | 1 |
_aSchiller, Mike, _eauthor. |
|
| 700 | 1 |
_aDavis, Chris, _eauthor. |
|
| 700 | 1 |
_aWrozek, Brian, _eauthor. |
|
| 942 |
_2ddc _cB |
||
| 999 |
_c181294 _d181294 |
||