Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISA Certified Information Systems Auditor Study Guide

Buy

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated twice a year, and this is the most up-to-date book available to prepare aspiring CISAs for the next exam.

  • CISAs are among the five highest-paid IT security professionals; more than 27,000 take the exam each year and the numbers are growing
  • Standards are updated twice a year, and this book offers the most up-to-date coverage as well as the proven Sybex approach that breaks down the content, tasks, and knowledge areas of the exam to cover every detail
  • Covers the IS audit process, IT governance, systems and infrastructure lifecycle management, IT service delivery and support, protecting information assets, disaster recovery, and more

Anyone seeking Certified Information Systems Auditor status will be fully prepared for the exam with the detailed information and approach found in this book.

(HTML tags aren't allowed.)

SharePoint 2010 Enterprise Architect's Guidebook
SharePoint 2010 Enterprise Architect's Guidebook
MICROSOFT COLLABORATION and companion development technologies have really come a long way over the past 20 years. Over this time, many different technologies have come and gone in the blink of an eye. Others have built up momentum, improving with each new version, providing valuable new features to meet the ever-increasing digital...
Intrinsically Motivated Learning in Natural and Artificial Systems
Intrinsically Motivated Learning in Natural and Artificial Systems

It has become clear to researchers in robotics and adaptive behaviour that current approaches are yielding systems with limited autonomy and capacity for self-improvement. To learn autonomously and in a cumulative fashion is one of the hallmarks of intelligence, and we know that higher mammals engage in exploratory activities that are not...

Java and the Java Virtual Machine: Definition, Verification, Validation
Java and the Java Virtual Machine: Definition, Verification, Validation
This book provides a high-level description, together with a mathematical and an experimental analysis, of Java and of the Java Virtual Machine (JVM), including a standard compiler of Java programs to JVM code and the security critical bytecode verifier component of the JVM. The description is structured into language layers and machine components....

Wireless Networking: Understanding Internetworking Challenges
Wireless Networking: Understanding Internetworking Challenges

This book focuses on providing a detailed and practical explanation of key existing and emerging wireless networking technologies and trends,while minimizing the amount of theoretical background information. The book also goes beyond simply presenting what the technology is, but also examines why the technology is the way it is, the history...

Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Your step-by-step guide to creating authentication processes that assure compliance

To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that,...

Activist Business Ethics
Activist Business Ethics
“The truth can wait, for it lives a long life”
(Arthur Schopenhauer, German philosopher, 1788-1860)

The philosopher Schopenhauer believed in the eventual triumph of truth, despite the disappointments engendered by his indifferent contemporaries. Two centuries later, we live in a time of accelerated changes, and we do not
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy