IT Auditing : (Record no. 25054)

MARC details
000 -LEADER
fixed length control field 02519nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field VITAP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200308162704.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190116b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071077279
040 ## - CATALOGING SOURCE
Transcribing agency VITAP
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd ed.
Classification number 005.8 DAV
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 9287
Personal name Davis, Chris
245 ## - TITLE STATEMENT
Title IT Auditing :
Remainder of title Using Controls to Protect Information Assets
Statement of responsibility, etc. / Chris Davis, Mike Schiller and Kevin Wheeler
250 ## - EDITION STATEMENT
Edition statement 2nd Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Chennai
Name of publisher, distributor, etc. McGraw Hill Education (India) Pvt. Ltd.
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 480p. : ill. ;
Dimensions 24cm
500 ## - GENERAL NOTE
General note It includes Index Pages.<br/><br/>Secure Your Systems Using the Latest IT Auditing Techniques<br/><br/>Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource.<br/><br/> Build and maintain an internal IT audit function with maximum effectiveness and value<br/> Audit entity-level controls, data centers, and disaster recovery<br/> Examine switches, routers, and firewalls<br/> Evaluate Windows, UNIX, and Linux operating systems<br/> Audit Web servers and applications<br/> Analyze databases and storage solutions<br/> Assess WLAN and mobile devices<br/> Audit virtualized environments<br/> Evaluate risks associated with cloud computing and outsourced operations<br/> Drill down into applications to find potential control weaknesses<br/> Use standards and frameworks, such as COBIT, ITIL, and ISO<br/> Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI<br/> Implement proven risk management practices
600 #0 - SUBJECT ADDED ENTRY--PERSONAL NAME
9 (RLIN) 9288
Personal name Electronic data processing—Auditing; Computer networks--Security measures; Computer security; Information audits
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 9289
Personal name Schiller, Mike
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 9290
Personal name Wheeler, Kevin
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.mheducation.co.in/it-auditing-using-controls-to-protect-information-assets-2nd-edition-9780071077279-india">https://www.mheducation.co.in/it-auditing-using-controls-to-protect-information-assets-2nd-edition-9780071077279-india</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Reference Book
Classification part 005.8 DAV
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Public note
    Dewey Decimal Classification Paperback   Not For Loan Reference School of Computer Science Section VIT-AP General Stacks 2018-12-15 Jaico Publishing House, Hyderabad 825.00 SINV04046   005.8 DAV 013007 2019-01-16 825.00 2019-01-16 Reference Book CSE

Visitor Number:

Powered by Koha