IT Auditing Using Controls to Protect Information Assets, 2/e (Paperback)
暫譯: 資訊資產保護的控制措施IT審計,第2版(平裝本)

Chris Davis, Mike Schiller, Kevin Wheeler

  • 出版商: McGraw-Hill Education
  • 出版日期: 2011-01-31
  • 售價: $2,640
  • 貴賓價: 9.5$2,508
  • 語言: 英文
  • 頁數: 512
  • 裝訂: Perfect Paperback
  • ISBN: 0071742387
  • ISBN-13: 9780071742382
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

商品描述

Secure Your Systems Using the Latest IT Auditing Techniques

Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource.

  • Build and maintain an internal IT audit function with maximum effectiveness and value
  • Audit entity-level controls, data centers, and disaster recovery
  • Examine switches, routers, and firewalls
  • Evaluate Windows, UNIX, and Linux operating systems
  • Audit Web servers and applications
  • Analyze databases and storage solutions
  • Assess WLAN and mobile devices
  • Audit virtualized environments
  • Evaluate risks associated with cloud computing and outsourced operations
  • Drill down into applications to find potential control weaknesses
  • Use standards and frameworks, such as COBIT, ITIL, and ISO
  • Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI
  • Implement proven risk management practices

商品描述(中文翻譯)

使用最新的 IT 審計技術來保護您的系統


本書《IT Auditing: Using Controls to Protect Information Assets, Second Edition》已全面更新,涵蓋最前沿的工具和技術,逐步解釋如何實施成功的企業級 IT 審計計劃。新增的章節包括雲計算審計、外包操作、虛擬化和存儲等內容。本綜合指南描述了如何組建一個有效的 IT 審計團隊並最大化 IT 審計功能的價值。針對特定審計的深入細節配有實際案例、現成的檢查清單和有價值的模板。本書還涵蓋了標準、框架、法規和風險管理技術,成為這一領域的權威資源。




  • 建立並維護一個內部 IT 審計功能,以達到最大的效能和價值

  • 審計實體級控制、數據中心和災難恢復

  • 檢查交換機、路由器和防火牆

  • 評估 Windows、UNIX 和 Linux 操作系統

  • 審計 Web 伺服器和應用程式

  • 分析數據庫和存儲解決方案

  • 評估 WLAN 和移動設備

  • 審計虛擬化環境

  • 評估與雲計算和外包操作相關的風險

  • 深入應用程式以查找潛在的控制弱點

  • 使用標準和框架,如 COBIT、ITIL 和 ISO

  • 了解法規,包括 Sarbanes-Oxley、HIPAA 和 PCI

  • 實施經過驗證的風險管理實踐