|
|
|
|
LEADER |
02661pamaa2200217 4500 |
001 |
0000045035 |
005 |
20130117090000.0 |
008 |
090330 eng |
020 |
0 |
0 |
|a 9780470009895
|
090 |
0 |
0 |
|a QA76.9.A93
|b CAS 2007
|
100 |
1 |
0 |
|a Cascarino
|
245 |
1 |
0 |
|a Auditor's guide to information systems auditing
|c Richard E. Cascarino.
|
260 |
0 |
0 |
|a Hoboken, N.J.:
|b John Wiley & Sons, Inc.,
|c 2007.
|
300 |
|
|
|a xxxiii, 474 p.:
|b ill.;
|c 24 cm.
|
500 |
0 |
0 |
|a Includes 1 CD-ROM titles "Auditor's guide to information systems auditing / Richard E. Cascarino"
|
501 |
0 |
0 |
|a BITMI
|
501 |
0 |
0 |
|a BCEGI
|
504 |
0 |
0 |
|a Includes bibliographical references and index
|
505 |
0 |
0 |
|a IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments
|
650 |
0 |
0 |
|a Electronic data processing --
|x Auditing
|
901 |
|
|
|u www.wiley.com
|