Jump to ratings and reviews
Rate this book

IT Auditing: Using Controls to Protect Information Assets

Rate this book
Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value

387 pages, Paperback

First published December 1, 2006

37 people are currently reading
63 people want to read

About the author

Chris Davis

122 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
15 (34%)
4 stars
10 (23%)
3 stars
16 (37%)
2 stars
2 (4%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Justin Miller.
27 reviews4 followers
June 6, 2015
Informative book on IT Auditing processes. I think it could have gone into better details about it, however. If I need to further my studies on this for my career, I definitely would pick a different book than this one.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.