<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02661pamaa2200217   4500</leader>
  <controlfield tag="001">0000045035</controlfield>
  <controlfield tag="005">20130117090000.0</controlfield>
  <controlfield tag="008">090330                             eng  </controlfield>
  <datafield tag="020" ind1="0" ind2="0">
   <subfield code="a">9780470009895 </subfield>
  </datafield>
  <datafield tag="090" ind1="0" ind2="0">
   <subfield code="a">QA76.9.A93 </subfield>
   <subfield code="b">CAS 2007</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2="0">
   <subfield code="a">Cascarino </subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Auditor's guide to information systems auditing  </subfield>
   <subfield code="c">Richard E. Cascarino.</subfield>
  </datafield>
  <datafield tag="260" ind1="0" ind2="0">
   <subfield code="a">Hoboken, N.J.: </subfield>
   <subfield code="b">John Wiley &amp; Sons, Inc., </subfield>
   <subfield code="c">2007.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">xxxiii, 474 p.: </subfield>
   <subfield code="b">ill.; </subfield>
   <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="500" ind1="0" ind2="0">
   <subfield code="a">Includes 1 CD-ROM titles &quot;Auditor's guide to information systems auditing / Richard E. Cascarino&quot;</subfield>
  </datafield>
  <datafield tag="501" ind1="0" ind2="0">
   <subfield code="a">BITMI</subfield>
  </datafield>
  <datafield tag="501" ind1="0" ind2="0">
   <subfield code="a">BCEGI</subfield>
  </datafield>
  <datafield tag="504" ind1="0" ind2="0">
   <subfield code="a">Includes bibliographical references and index</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2="0">
   <subfield code="a">IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service  center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Electronic data processing -- </subfield>
   <subfield code="x">Auditing </subfield>
  </datafield>
  <datafield tag="901" ind1=" " ind2=" ">
   <subfield code="u">www.wiley.com</subfield>
  </datafield>
 </record>
</collection>
