Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Pearson IT Certification
2007
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780789735737/?ar |
Zusammenfassung: | CISA Exam Prep Certified Information Systems Auditor Michael Gregg Your Complete Certification Solution! The Smart Way to Study In This Book You'll Learn How To: Approach the IS audit process from ISACA's view of IS auditing best practices Relate and apply information security and systems audit best practices to the six CISA job practice areas Understand the IS audit process and learn how to apply best practices to secure an organization's assets Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls Minimize risk within an IT/IS environment by using sound security techniques and practices Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity Streamline your exam preparations with our exam insights, tips, and study strategies WRITTEN BY A LEADING CISA EXAM EXPERT! Michael Gregg, founder and president of Superior Solutions, Inc., a Houston-based IT security consulting and auditing firm, has more than 20 years experience in information security and risk. He holds two associate degrees, a bachelor's degree, and a master's degree. He presently maintains more than a dozen certifications and is a nine-time winner of Global Knowledge's Perfect Instructor Award. Michael not only has experience in performing security audits and assessments, but also is the author of Que Publishing's Certified Ethical Hacker Exam Prep, CISSP Exam Cram, and is the co-author of Inside Network Security Assessment: Guarding Your IT Infrastructure by Sams Publishing. |
Umfang: | 1 Online-Ressource (600 pages) |
ISBN: | 9780789735737 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047513950 | ||
003 | DE-627-1 | ||
005 | 20240228120818.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9780789735737 |9 978-0-7897-3573-7 | ||
035 | |a (DE-627-1)047513950 | ||
035 | |a (DE-599)KEP047513950 | ||
035 | |a (ORHE)9780789735737 | ||
035 | |a (DE-627-1)047513950 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/03 |2 23/eng/20230124 | |
100 | 1 | |a Gregg, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a CISA Exam Prep |c Gregg, Michael |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Pearson IT Certification |c 2007 | |
300 | |a 1 Online-Ressource (600 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a CISA Exam Prep Certified Information Systems Auditor Michael Gregg Your Complete Certification Solution! The Smart Way to Study In This Book You'll Learn How To: Approach the IS audit process from ISACA's view of IS auditing best practices Relate and apply information security and systems audit best practices to the six CISA job practice areas Understand the IS audit process and learn how to apply best practices to secure an organization's assets Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls Minimize risk within an IT/IS environment by using sound security techniques and practices Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity Streamline your exam preparations with our exam insights, tips, and study strategies WRITTEN BY A LEADING CISA EXAM EXPERT! Michael Gregg, founder and president of Superior Solutions, Inc., a Houston-based IT security consulting and auditing firm, has more than 20 years experience in information security and risk. He holds two associate degrees, a bachelor's degree, and a master's degree. He presently maintains more than a dozen certifications and is a nine-time winner of Global Knowledge's Perfect Instructor Award. Michael not only has experience in performing security audits and assessments, but also is the author of Que Publishing's Certified Ethical Hacker Exam Prep, CISSP Exam Cram, and is the co-author of Inside Network Security Assessment: Guarding Your IT Infrastructure by Sams Publishing. | ||
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Data protection | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology ; Security measures | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780789735737/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047513950 |
---|---|
_version_ | 1835903203568254976 |
adam_text | |
any_adam_object | |
author | Gregg, Michael |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Gregg, Michael Safari, an O'Reilly Media Company |
author_role | aut |
author_sort | Gregg, Michael |
author_variant | m g mg |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047513950 (DE-599)KEP047513950 (ORHE)9780789735737 |
dewey-full | 658.4/03 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/03 |
dewey-search | 658.4/03 |
dewey-sort | 3658.4 13 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03693cam a22004932c 4500</leader><controlfield tag="001">ZDB-30-ORH-047513950</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120818.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780789735737</subfield><subfield code="9">978-0-7897-3573-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047513950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047513950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780789735737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047513950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/03</subfield><subfield code="2">23/eng/20230124</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gregg, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CISA Exam Prep</subfield><subfield code="c">Gregg, Michael</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Pearson IT Certification</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (600 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">CISA Exam Prep Certified Information Systems Auditor Michael Gregg Your Complete Certification Solution! The Smart Way to Study In This Book You'll Learn How To: Approach the IS audit process from ISACA's view of IS auditing best practices Relate and apply information security and systems audit best practices to the six CISA job practice areas Understand the IS audit process and learn how to apply best practices to secure an organization's assets Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls Minimize risk within an IT/IS environment by using sound security techniques and practices Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity Streamline your exam preparations with our exam insights, tips, and study strategies WRITTEN BY A LEADING CISA EXAM EXPERT! Michael Gregg, founder and president of Superior Solutions, Inc., a Houston-based IT security consulting and auditing firm, has more than 20 years experience in information security and risk. He holds two associate degrees, a bachelor's degree, and a master's degree. He presently maintains more than a dozen certifications and is a nine-time winner of Global Knowledge's Perfect Instructor Award. Michael not only has experience in performing security audits and assessments, but also is the author of Que Publishing's Certified Ethical Hacker Exam Prep, CISSP Exam Cram, and is the co-author of Inside Network Security Assessment: Guarding Your IT Infrastructure by Sams Publishing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780789735737/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047513950 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:15:32Z |
institution | BVB |
isbn | 9780789735737 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (600 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Pearson IT Certification |
record_format | marc |
spelling | Gregg, Michael VerfasserIn aut CISA Exam Prep Gregg, Michael 1st edition. [Erscheinungsort nicht ermittelbar] Pearson IT Certification 2007 1 Online-Ressource (600 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier CISA Exam Prep Certified Information Systems Auditor Michael Gregg Your Complete Certification Solution! The Smart Way to Study In This Book You'll Learn How To: Approach the IS audit process from ISACA's view of IS auditing best practices Relate and apply information security and systems audit best practices to the six CISA job practice areas Understand the IS audit process and learn how to apply best practices to secure an organization's assets Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls Minimize risk within an IT/IS environment by using sound security techniques and practices Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity Streamline your exam preparations with our exam insights, tips, and study strategies WRITTEN BY A LEADING CISA EXAM EXPERT! Michael Gregg, founder and president of Superior Solutions, Inc., a Houston-based IT security consulting and auditing firm, has more than 20 years experience in information security and risk. He holds two associate degrees, a bachelor's degree, and a master's degree. He presently maintains more than a dozen certifications and is a nine-time winner of Global Knowledge's Perfect Instructor Award. Michael not only has experience in performing security audits and assessments, but also is the author of Que Publishing's Certified Ethical Hacker Exam Prep, CISSP Exam Cram, and is the co-author of Inside Network Security Assessment: Guarding Your IT Infrastructure by Sams Publishing. Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Gregg, Michael CISA Exam Prep Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
title | CISA Exam Prep |
title_auth | CISA Exam Prep |
title_exact_search | CISA Exam Prep |
title_full | CISA Exam Prep Gregg, Michael |
title_fullStr | CISA Exam Prep Gregg, Michael |
title_full_unstemmed | CISA Exam Prep Gregg, Michael |
title_short | CISA Exam Prep |
title_sort | cisa exam prep |
topic | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
topic_facet | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
work_keys_str_mv | AT greggmichael cisaexamprep AT safarianoreillymediacompany cisaexamprep |