Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Auditor's Guide to Information Systems Auditing

Buy

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what the role of auditors really is and will convey to them what they must know, understand, and look for when performing audits. For experiencedauditors, this book will serve as a reality check to determine whether they are examining the right issues and whether they are being sufficiently comprehensive in their focus. Richard Cascarino has done a superb job."
—E. Eugene Schultz, PhD, CISSP, CISM Chief Technology Officer and Chief Information Security Officer, High Tower Software

A step–by–step guide tosuccessful implementation

and control of information systems

More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types of organizations. However, many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Auditor′s Guide to Information Systems Auditing presents an easy, practical guide for auditors that can be applied to all computing environments.

As networks and enterprise resource planning systems bring resources together, and as increasing privacy violations threaten more organization, information systems integrity becomes more important than ever. With a complimentary student′sversion of the IDEA Data Analysis Software CD, Auditor′s Guide to Information Systems Auditing empowers auditors to effectively gauge the adequacy and effectiveness of information systems controls.

About the Author

RICHARD CASCARINO, MBA, CIA, CFE, CISM, has, for the last eighteen years, been providing consultancy and professional development services to clients throughout the southern African region as well as in Europe, the Middle East, and the United States. Well-known in international auditing circles as one of the most knowledgeable practitioners in the field, he is a regular speaker at international conferences and has presented courses throughout Africa, Europe, the Middle East, and the United States. He is a past president of the Institute of Internal Auditors in South Africa, was the founding regional director of the Southern African Region of the IIA-Inc., and is a member of both the Information Systems Audit and Control Association and the American Institute of Certified Fraud Examiners (South African Chapter). He is also a coauthor of Internal Auditing: An Integrated Approach.

(HTML tags aren't allowed.)

Columbia: Final Voyage
Columbia: Final Voyage
In ‘Columbia: Final Voyage’ aerospace writer Philip Chien, who has over 20 years’ experience covering the US space program, provides a unique insight into the crew members who lost their lives in the Columbia disaster. Chien interviewed all seven crew members several times and got to know them as individuals. He reviews in detail...
Apoptosis And Its Relevance to Autoimmunity (Current Directions in Autoimmunity)
Apoptosis And Its Relevance to Autoimmunity (Current Directions in Autoimmunity)

Over the last 15 years, apoptosis has become a dominant focus of medical research in the field of immunology. This publication discusses the three major areas of apoptosis research: extrinsic death receptor pathways, intrinsic cell death pathways and the mechanisms responsible for apoptotic cell clearance. Each section delineates the proteins...

Microsoft  Visual Basic  2005 Step by Step
Microsoft Visual Basic 2005 Step by Step

Welcome to Microsoft Visual Basic 2005 Step by Step, a comprehensive introduction to Visual Basic programming using the Microsoft Visual Basic 2005 software. I've designed this practical, hands-on tutorial with a variety of skill levels in mind. The result is that new programmers can learn software...


Reviews of Environmental Contamination and Toxicology Volume 223
Reviews of Environmental Contamination and Toxicology Volume 223
The role of Reviews is to publish detailed scientific review articles on all aspects ofenvironmental contamination and associated toxicological consequences. Such articlesfacilitate the often complex task of accessing and interpreting cogent scientificdata within the confines of one or more closely related research fields.
...
The Magus a Complete System of Occult Philosophy
The Magus a Complete System of Occult Philosophy

1801. In this work, the author has collected many curious and rare studies and ideas in regard to the subject of natural magic, the Cabala, celestial and ceremonial magic, alchemy, and magnetism. Selected contents: use of astrology, amulets and charms, stones, alchemy, the four elements, magnetism, cabalistical magic, the composition of the...

Network Security Tools : Writing, Hacking, and Modifying Security Tools
Network Security Tools : Writing, Hacking, and Modifying Security Tools
This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy