Home | Amazing | Today | Tags | Publishers | Years | Search 
IT Auditing: Using Controls to Protect Information Assets

Buy

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.

Build and maintain an IT audit function with maximum effectiveness and value

  • Implement best practice IT audit processes and controls
  • Analyze UNIX-, Linux-, and Windows-based operating systems
  • Audit network routers, switches, firewalls, WLANs, and mobile devices
  • Evaluate entity-level controls, data centers, and disaster recovery plans
  • Examine Web servers, platforms, and applications for vulnerabilities
  • Review databases for critical controls
  • Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
  • Implement sound risk analysis and risk management practices
  • Drill down into applications to find potential control weaknesses

About the Authors

Chris Davis, CISA, CISSP, leverages his experience auditing IT systems for Texas Instruments. Mr. Davis has trained and presented in information security, advanced computer forensic analysis, and hardware security design. He actively teaches auditing and certification curriculum for Southern Methodist University and is the author and contributor to several books and publications. His contributions include projects and presentations for SANS, Gartner, Harvard, BlackHat, and 3GSM. He has enjoyed positions at Texas Instruments, Austin Microsoft Technology Center, and Cisco Systems. He holds a bachelor's degree in nuclear engineering technologies from Thomas Edison, and a master's in business from the University of Texas at Austin. Chris was a U.S. Navy submariner, and served on the deep dive Submarine NR-1 and the ballistic missile OHIO class USS Nebraska, SSBN 739, Blue Crew.

Mike Schiller, CISA, has 14 years of experience in the IT audit field, most recently as the worldwide IT audit manager at Texas Instruments(TI). Prior to that, Mike served as the IT audit manager at The Sabre Group, where he served as the company's first-ever IT audit manager, creating the IT audit function, team, and processes from the ground up. Mike also has several years of experience as a senior IT auditor, programmer/analyst, and manager of IT support teams. He is involved in multiple industry IT audit organizations and has been a presenter at IT conferences such as ASUG. In addition to his years of experience in corporate management, Mike is also heavily involved in leadership at his church, Richardson East Church of Christ. He has a bachelor's degree in business analysis from Texas A&M University.

Kevin Wheeler, CISA, CISSP, NSA IAM/IEM, is the founder and CEO of InfoDefense, an information security consultancy. Mr. Wheeler's project and employment portfolio includes organizations such as Bank of America, EDS, McAfee, Southern Methodist University and the State of Texas. He has performed information security audits and assessments as well as information security design, computer incident response, business continuity planning, and IT security training for both government and commercial entities in the financial services, healthcare, and IT services industries. He holds a bachelor of business administration degree from Baylor University and is an active member of ISSA, ISACA, Infragard, the North Texas Electronic Crimes Task Force, and Greater Dallas Chamber of Commerce.

Hypernumbers and Extrafunctions: Extending the Classical Calculus (SpringerBriefs in Mathematics)
Hypernumbers and Extrafunctions: Extending the Classical Calculus (SpringerBriefs in Mathematics)

“Hypernumbers and Extrafunctions” presents a rigorous mathematical approach to operate with infinite values. First, concepts of real and complex numbers are expanded to include a new universe of numbers called hypernumbers which includes infinite quantities. This brief extends classical calculus based on real functions by...

Nutrition and Metabolism: Underlying Mechanisms and Clinical Consequences
Nutrition and Metabolism: Underlying Mechanisms and Clinical Consequences
"Nutrition and Metabolism: Underlying Mechanisms and Clinical Consequences" brings together internationally recognized experts to comprehensively review our current understanding of how nutrition interacts with the genetic substrate as well as environmental-exogenous factors, including physical activity or the lack thereof, to result in...
Integrating Research and Practice in Software Engineering (Studies in Computational Intelligence)
Integrating Research and Practice in Software Engineering (Studies in Computational Intelligence)

In this book, the authors highlight recent findings that hold the potential to improve software products or development processes; in addition, they help readers understand new concepts and technologies, and to see what it takes to migrate from old to new platforms. Some of the authors have spent most of their careers in industry,...


Numerical Polynomial Algebra
Numerical Polynomial Algebra
This first book on the numerical analysis of polynomial systems is a stepping stone at the interface of symbolic computation and numerical computation. Bernard Sturmfels, Department of Mathematics, University of Berkeley

I am not familiar with any books that do such a careful job of combining numerical analysis with the algebra of
...
Engineering Wireless-Based Software Systems And Applications
Engineering Wireless-Based Software Systems And Applications
This comprehensive resource offers professionals detailed guidance on the engineering aspects of building software for wireless communications. From design and architecture to security and testing, the book shows how to overcome every engineering challenge encountered in successfully developing wireless software. Filled with open-source code...
Full Stack JavaScript: Learn Backbone.js, Node.js and MongoDB
Full Stack JavaScript: Learn Backbone.js, Node.js and MongoDB
This is a hands-on book which introduces you to agile JavaScript web and mobile software development using the latest cutting-edge front-end and back-end technologies including: Node.js, MongoDB, Backbone.js, Parse.com, Heroku and Windows Azure.

Practical examples include building multiple versions
...
©2024 LearnIT (support@pdfchm.net) - Privacy Policy