It Auditing Using Controls to Protect Information Assets, 3/e (Paperback)
暫譯: 資訊資產保護的控制措施IT審計,第3版(平裝本)

Kegerreis, Mike, Schiller, Mike, Davis, Chris

  • 出版商: McGraw-Hill Education
  • 出版日期: 2019-09-30
  • 售價: $2,650
  • 貴賓價: 9.5$2,518
  • 語言: 英文
  • 頁數: 576
  • ISBN: 1260453227
  • ISBN-13: 9781260453225
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

Secure Your Systems Using the Latest IT Auditing Techniques

Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource.

- Build and maintain an internal IT audit function with maximum effectiveness and value
- Audit entity-level controls and cybersecurity programs
- Assess data centers and disaster recovery
- Examine switches, routers, and firewalls
- Evaluate Windows, UNIX, and Linux operating systems
- Audit Web servers and applications
- Analyze databases and storage solutions
- Review big data and data repositories
- Assess end user computer devices, including PCs and mobile devices
- Audit virtualized environments
- Evaluate risks associated with cloud computing and outsourced operations
- Drill down into applications and projects to find potential control weaknesses
- Learn best practices for auditing new technologies
- Use standards and frameworks, such as COBIT, ITIL, and ISO
- Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI
- Implement proven risk management practices

 

商品描述(中文翻譯)

使用最新的 IT 審計技術來保護您的系統

《IT 審計:利用控制來保護資訊資產(第三版)》已全面更新,以涵蓋最前沿的工具和技術,逐步解釋如何實施成功的企業級 IT 審計計劃。新章節涵蓋了對網路安全計劃、大數據和數據庫以及新技術的審計。本綜合指南描述了如何組建有效的 IT 審計團隊並最大化 IT 審計功能的價值。針對特定審計的深入細節伴隨著實際案例、可用的檢查清單和有價值的範本。本權威資源還涵蓋了標準、框架、法規和風險管理技術。

- 建立和維護內部 IT 審計功能,以達到最大的效能和價值
- 審計實體級控制和網路安全計劃
- 評估數據中心和災難恢復
- 檢查交換機、路由器和防火牆
- 評估 Windows、UNIX 和 Linux 作業系統
- 審計 Web 伺服器和應用程式
- 分析數據庫和儲存解決方案
- 審查大數據和數據庫
- 評估終端用戶計算設備,包括 PC 和移動設備
- 審計虛擬化環境
- 評估與雲計算和外包操作相關的風險
- 深入應用程式和專案以尋找潛在的控制弱點
- 學習審計新技術的最佳實踐
- 使用標準和框架,如 COBIT、ITIL 和 ISO
- 了解法規,包括薩班斯-奧克斯利法案(Sarbanes-Oxley)、健康保險可攜性與責任法案(HIPAA)和支付卡產業(PCI)
- 實施經過驗證的風險管理實踐

作者簡介

Mike Kegerreis, CISSP, is the lead information security architect at Texas Instruments and has over 20 years of experience in designing, developing, and securing IT systems.

Mike Schiller, CISA, is the chief information security officer at Texas Instruments and has more than 15 years of experience in the IT audit field, including as the IT audit director at Texas Instruments and Sabre.

Chris Davis, MBA, CISA, CISSP, CCNP, is the coauthor of Hacking Exposed Computer Forensics, Second Edition and Anti-Hacker Tool Kit, Third Edition.

 

作者簡介(中文翻譯)

Mike Kegerreis,CISSP,是德州儀器的首席資訊安全架構師,擁有超過20年的IT系統設計、開發和安全經驗。

Mike Schiller,CISA,是德州儀器的首席資訊安全官,擁有超過15年的IT審計領域經驗,包括擔任德州儀器和Sabre的IT審計總監。

Chris Davis,MBA,CISA,CISSP,CCNP,是《Hacking Exposed Computer Forensics, Second Edition》和《Anti-Hacker Tool Kit, Third Edition》的共同作者。