 |
|
|
|
 CISA Exam Cram 2 : Certified Information Systems AuditorWant an affordable yet innovative approach to studying for the Certified Information Systems Auditor (CISA) 2005 exam? CISA 2005 Exam Cram 2 is your solution. You will have the essential material for passing the CISA 2005 exam right at your fingertips. All exam objectives are covered and you'll find practice exams,... |  |  The CISA Prep Guide: Mastering the Certified Information Systems Auditor ExamThe first commercially available book to offer CISA study material
The CISA certification is a prerequisite for many audit and security job postings in the marketplace today. Becom-ing certified takes years of experience and exposure to information systems and risk and control techniques. In this book, John Kramer refers to his own experiences... |  |  CISA Certified Information Systems Auditor All-in-One Exam Guide"All-in-One is All You Need."
CISA Certified Information Systems Auditor All in One Exam Guide
Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this... |
|
 CISA Certified Information Systems Auditor Study Guide
The industry-leading study guide for the CISA exam, fully updated
More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated... |  |  IT Auditing Using Controls to Protect Information Assets, 2nd Edition
When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT... |  |  Auditing Cloud Computing: A Security and Privacy Guide
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just... |
|
Result Page: 5 4 3 2 1 |