You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This guide details an approach to undertaking IT process assessments based on the COBIT 5 Process Assessment Model or PAM. Included in this guide are sufficient information from the COBIT PAM and a full self-assessment template to simplify the self-assessment process.
Essential guidance for the financial auditor in need of a working knowledge of IT If you're a financial auditor needing working knowledge of IT and application controls, Automated Auditing Financial Applications for Small and Mid-Sized Businesses provides you with the guidance you need. Conceptual overviews of key IT auditing issues are included, as well as concrete hands-on tips and techniques. Inside, you'll find background and guidance with appropriate reference to material published by ISACA, AICPA, organized to show the increasing complexity of systems, starting with general principles and progressing through greater levels of functionality. Provides straightforward IT guidance to finan...
The business to business trade publication for information and physical Security professionals.
The business to business trade publication for information and physical Security professionals.
"Auditing IT Infrastructures for Compliance, Second Edition provides a unique, in-depth look at U.S. based Information systems and IT infrastructures compliance laws in the public and private sector. This book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure
The business to business trade publication for information and physical Security professionals.
When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
The business to business trade publication for information and physical Security professionals.