2011年9月17日星期六

IT Auditing: Using Controls to Protect Information Assets --Free PDF Ebook Download


Free PDF Ebook Download


  • Paperback: 387 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (December 22, 2006)
  • Language: English
  • ISBN-10: 0072263431
  • ISBN-13: 978-0072263435
  • Product Dimensions: 9.2 x 7.4 x 0.9 inches

    Product Description

    Protect Your Systems with Proven IT Auditing Strategies

     "A must-have for auditors and IT professionals."  -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.

    Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing:Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. 

    Build and maintain an IT audit function with maximum effectiveness and value

    Implement best practice IT audit processes and controls
    Analyze UNIX-, Linux-, and Windows-based operating systems
    Audit network routers, switches, firewalls, WLANs, and mobile devices
    Evaluate entity-level controls, data centers, and disaster recovery plans
    Examine Web servers, platforms, and applications for vulnerabilities
    Review databases for critical controls
    Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
    Implement sound risk analysis and risk management practices
    Drill down into applications to find potential control weaknesses

    About the Author

    Chris Davis, CISA, CISSP, shares his experience from architecting, hardening, and auditing systems. He has trained auditors and forensic analysts. Davis is the coauthor of the bestselling Hacking Exposed: Computer Forensics.

    Mike Schiller, CISA, has 14 years of experience in the IT audit field, most recently as the worldwide IT Audit Manager at Texas Instruments.

    Kevin Wheeler, CISA, CISSP, NSA IAM/IEM, is the founder and CEO of InfoDefense and has over ten years of IT security experience. 

     



  • 没有评论:

    发表评论