000 01575nam a2200337 i 4500
003 OSt
005 20210118113124.0
008 210117t20202020nyua er 001 0 eng d
020 _a9781260453225
_qpaperback
_cRM245.00
040 _aPPAK
_beng
_cPPAK
_erda
082 0 4 _223
_a005.8
090 0 0 _a005.8
_bKEG
_dR
100 1 _aKegerreis, Mike,
_eauthor.
245 1 0 _aIT Auditing :
_bUsing Controls to Protect Information Assets /
_cMike Kegerreis, Mike Schiller, Chris Davis with Brian Wrozek
250 _aThird Edition
264 1 _aNew York :
_bMcGraw-Hill,
_c2020
264 4 _c©2020
300 _axxi, 553 pages :
_billustrations ;
_c23 cm
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
504 _aIncludes bibliographical references and index.
520 _a"Explains, step by step, how to implement a successful, enterprise-wide IT audit program...This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered."--Publisher's description.
650 1 0 _aElectronic data processing
_vAuditing
650 2 0 _aComputer networks
_vSecurity measures
650 2 0 _aComputer security
700 1 _aSchiller, Mike,
_eauthor.
700 1 _aDavis, Chris,
_eauthor.
700 1 _aWrozek, Brian,
_eauthor.
942 _2ddc
_cB
999 _c181294
_d181294