COVID-19 Response at Fishpond.com.au

Read what we're doing...

It Auditing
By

Rating

Product Description
Product Details

Table of Contents

Part I: Audit Overview Chapter 1. Building an Effective Internal IT Audit Function Chapter 2. The Audit Process Part II: Auditing Techniques Chapter 3. Auditing Entity-Level Controls Chapter 4. Auditing Data Centers and Disaster Recovery Chapter 5. Auditing Switches, Routers, and Firewalls Chapter 6. Auditing Windows Operating Systems Chapter 7. Auditing Unix and Linux Operating Systems Chapter 8. Auditing Web Servers Chapter 9. Auditing Databases Chapter 10.Auditing Applications Chapter 11.Auditing WLAN and Mobile Devices Chapter 12.Auditing Company Projects Part III: Frameworks, Standards, and Regulations Chapter 13.Frameworks and Standards Chapter 14.Regulations Chapter 15: Risk Management Index

About the Author

Chris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics. Mike Schiller, CISA (Dallas, TX) is the worldwide IT audit manager at Texas Instruments. Kevin Wheeler, CISSP, CISA, NSA IAM/IEM (Carrollton, TX) is the founder and CEO of InfoDefense.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Networking » General
Home » Books » Computers » Security » Networking
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.
Back to top