IT Auditing: Using Controls to Protect Information Assets

本书由经验丰富的IT审计和安全专业人员撰写,介绍了如何使用最新审计工具实施有效的IT审计计划,包括操作系统分析、网络设备审计、数据库审查等内容,并涵盖了法律标准、隐私问题及CobiT标准等关键主题。
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.youkuaiyun.com/topmvp - topmvp
Protect Your Systems with Proven IT Auditing Strategies

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.

Build and maintain an IT audit function with maximum effectiveness and value
*Implement best practice IT audit processes and controls
*Analyze UNIX-, Linux-, and Windows-based operating systems
*Audit network routers, switches, firewalls, WLANs, and mobile devices
*Evaluate entity-level controls, data centers, and disaster recovery plans
*Examine Web servers, platforms, and applications for vulnerabilities
*Review databases for critical controls
*Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
*Implement sound risk analysis and risk management practices
*Drill down into applications to find potential control weaknesses

http://rapidshare.com/files/29878841/0072263431.zip
http://depositfiles.com/files/835349
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值