Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 55,18
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por McGraw-Hill Education 9/30/2019, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Librería: BargainBookStores, Grand Rapids, MI, Estados Unidos de America
EUR 57,51
Cantidad disponible: 5 disponibles
Añadir al carritoPaperback or Softback. Condición: New. It Auditing Using Controls to Protect Information Assets, Third Edition. Book.
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
EUR 52,47
Cantidad disponible: 2 disponibles
Añadir al carritoPAP. Condición: New. New Book. Shipped from UK. Established seller since 2000.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 61,80
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Idioma: Inglés
Publicado por McGraw-Hill Education, US, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 68,64
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 52,13
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por McGraw-Hill Education, US, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
EUR 69,35
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 59,50
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: New. 2019. 3rd Edition. Paperback. . . . . .
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 62,30
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Kennys Bookstore, Olney, MD, Estados Unidos de America
EUR 71,73
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: New. 2019. 3rd Edition. Paperback. . . . . . Books ship from the US and Ireland.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 62,11
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback / softback. Condición: New. New copy - Usually dispatched within 3 working days.
Idioma: Inglés
Publicado por McGraw-Hill Education, US, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Librería: Rarewaves USA United, OSWEGO, IL, Estados Unidos de America
EUR 71,06
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.
Librería: moluna, Greven, Alemania
EUR 63,52
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: New. Über den AutorrnrnnChris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.nInhaltsverzeichnisPART 1: Audit Overvi.
Idioma: Inglés
Publicado por McGraw-Hill Education, US, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Librería: Rarewaves.com UK, London, Reino Unido
EUR 63,64
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 63,07
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 74,62
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource.¿ Build and maintain an internal IT audit function with maximum effectiveness and value¿ Audit entity-level controls and cybersecurity programs¿ Assess data centers and disaster recovery¿ Examine switches, routers, and firewalls¿ Evaluate Windows, UNIX, and Linux operating systems¿ Audit Web servers and applications¿ Analyze databases and storage solutions¿ Review big data and data repositories¿ Assess end user computer devices, including PCs and mobile devices¿ Audit virtualized environments¿ Evaluate risks associated with cloud computing and outsourced operations¿ Drill down into applications and projects to find potential control weaknesses¿ Learn best practices for auditing new technologies¿ Use standards and frameworks, such as COBIT, ITIL, and ISO¿ Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI¿ Implement proven risk management practices.
Librería: preigu, Osnabrück, Alemania
EUR 71,05
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. IT Auditing Using Controls to Protect Information Assets, Third Edition | Mike Kegerreis (u. a.) | Taschenbuch | Kartoniert / Broschiert | Englisch | 2019 | McGraw-Hill Education | EAN 9781260453225 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.