WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/477308795

IT Audit, Control, and Security

Combines the areas of computer audit, computer control, and computer security in one book.; Offers step-by-step guidance on auditing, control, and security.; Provides numberous control objectives.

Open All Close All

http://schema.org/about

http://schema.org/description

  • "Combines the areas of computer audit, computer control, and computer security in one book.; Offers step-by-step guidance on auditing, control, and security.; Provides numberous control objectives."@en
  • "This section discusses IT audit cybersecurity and privacy control activities from two focus areas. First is focus on some of the many cybersecurity and privacy concerns that auditors should consider in their reviews of IT-based systems and processes. Second focus area includes IT Audit internal procedures. IT audit functions sometimes fail to implement appropriate security and privacy protection controls over their own IT audit processes, such as audit evidence materials, IT audit workpapers, auditor laptop computer resources, and many others. Although every audit department is different, this section suggests best practices for an IT audit function and concludes with a discussion on the payment card industry data security standard data security standards (PCI-DSS), a guideline that has been developed by major credit card companies to help enterprises that process card payments prevent credit card fraud and to provide some protection from various credit security vulnerabilities and threats. IT auditors should understand the high-level key elements of this standard and incorporate it in their review where appropriate."
  • "When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the iIT Audit, Control, and Security/i describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats."@en

http://schema.org/genre

  • "Electronic books"@en
  • "Electronic books"
  • "Ressources Internet"

http://schema.org/name

  • "IT Audit, Control, and Security"@en
  • "IT Audit, Control, and Security"
  • "It audit, control, and security"@en
  • "IT Audit, control, and security"
  • "IT audit, control, and security"@en
  • "IT audit, control, and security"