Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISA Certified Information Systems Auditor All-in-One Exam Guide

Buy

"All-in-One is All You Need."

CISA Certified Information Systems Auditor All in One Exam Guide

Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this authoritative guide covers all six exam domains developed by the Information Systems Audit and Control Association (ISACA). You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CISA exam with ease, this definitive volume also serves as an essential on-the-job reference.

Covers all exam topics, including:

  • IS audit process
  • IT governance
  • Network technology and security
  • Systems and infrastructure lifestyle management
  • IT service delivery and support
  • Protection of information assets
  • Physical security
  • Business continuity and disaster recovery

Peter H. Gregory, DRCE, CISSP, CISA, is a security and risk manager at a financial management company. He is a member of the board of advisors and is the lead instructor for the University of Washington's certificate program in Information Systems Security.

(HTML tags aren't allowed.)

Beginning MapServer: Open Source GIS Development (Expert's Voice in Open Source)
Beginning MapServer: Open Source GIS Development (Expert's Voice in Open Source)
Maps have played a prominent role in human activity for thousands of years. One of the earliest known maps was uncovered during the course of an archaeological excavation in Turkey in 1961. The Çatalhöyük site is a neolithic settlement dating from approximately 6500 BC. The map consists of a partially preserved, painted plaster...
Speak English Like an American
Speak English Like an American
Remember your good old English textbook which started with an introduction of the characters who would be in the dialogs throughout the units? That's how this book is laid out. Idioms are contextualized and there are various consolidation exercises between units to reinforce them. The accompanying CD is very clear and the voices convey the moods of...
Quantum Attacks on Public-Key Cryptosystems
Quantum Attacks on Public-Key Cryptosystems

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...


Histology for Pathologists
Histology for Pathologists
Now completely revised and updated, this ground-breaking text focuses on the borderland between histology and pathology. The text describes human histology and its variations, with emphasis on avoiding overdiagnosis or misdiagnosis of normal variants. Presented by leading international specialists in pathology, histopathology, anatomical pathology,...
Image Recognition and Classification (Optical Engineering, 78)
Image Recognition and Classification (Optical Engineering, 78)
This book presents important recent advances in sensors, image processing algorithms, and systems for image recognition and classification with diverse applications in military, aerospace, security, image tracking, radar, biomedical, and intelligent transportation. The book includes contributions by some of the leading researchers in the field to...
Microsoft  Office Excel  2007 Inside Out
Microsoft Office Excel 2007 Inside Out
Learn everything you need to know for working with Microsoft Office Excel 2007--from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using Office Excel 2007--all in concise, fast-answer format. Whether you are upgrading from Office 97 or Office 2003, you'll be able to dig in to the...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy