IT auditing: using controls to protect information assets
Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. --
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
McGraw-Hill
[2020]
|
Ausgabe: | Third edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781260453232/?ar |
Zusammenfassung: | Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed October 14, 2019) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781260453232 1260453235 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048562823 | ||
003 | DE-627-1 | ||
005 | 20240228120903.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781260453232 |9 978-1-260-45323-2 | ||
020 | |a 1260453235 |9 1-260-45323-5 | ||
035 | |a (DE-627-1)048562823 | ||
035 | |a (DE-599)KEP048562823 | ||
035 | |a (ORHE)9781260453232 | ||
035 | |a (DE-627-1)048562823 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 657/.458 |2 23 | |
100 | 1 | |a Kegerreis, Mike |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IT auditing |b using controls to protect information assets |c Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek |
250 | |a Third edition. | ||
264 | 1 | |a New York |b McGraw-Hill |c [2020] | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed October 14, 2019) | ||
520 | |a Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- | ||
650 | 0 | |a Electronic data processing |x Auditing | |
650 | 0 | |a Information technology |x Management | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Technologie de l'information ; Gestion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic data processing ; Auditing | |
650 | 4 | |a Information technology ; Management | |
700 | 1 | |a Davis, Chris |e VerfasserIn |4 aut | |
700 | 1 | |a Schiller, Mike |e VerfasserIn |4 aut | |
700 | 1 | |a Wrozek, Brian |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781260453232/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048562823 |
---|---|
_version_ | 1821494850608955392 |
adam_text | |
any_adam_object | |
author | Kegerreis, Mike Davis, Chris Schiller, Mike Wrozek, Brian |
author_facet | Kegerreis, Mike Davis, Chris Schiller, Mike Wrozek, Brian |
author_role | aut aut aut aut |
author_sort | Kegerreis, Mike |
author_variant | m k mk c d cd m s ms b w bw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048562823 (DE-599)KEP048562823 (ORHE)9781260453232 |
dewey-full | 657/.458 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 657 - Accounting |
dewey-raw | 657/.458 |
dewey-search | 657/.458 |
dewey-sort | 3657 3458 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | Third edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02226cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-048562823</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120903.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781260453232</subfield><subfield code="9">978-1-260-45323-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1260453235</subfield><subfield code="9">1-260-45323-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048562823</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048562823</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781260453232</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048562823</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">657/.458</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kegerreis, Mike</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IT auditing</subfield><subfield code="b">using controls to protect information assets</subfield><subfield code="c">Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed October 14, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. --</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing ; Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Davis, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schiller, Mike</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wrozek, Brian</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781260453232/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048562823 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:56Z |
institution | BVB |
isbn | 9781260453232 1260453235 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Kegerreis, Mike VerfasserIn aut IT auditing using controls to protect information assets Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek Third edition. New York McGraw-Hill [2020] ©2020 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed October 14, 2019) Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. -- Electronic data processing Auditing Information technology Management Computer networks Security measures Computer security Computer Security Technologie de l'information ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electronic data processing ; Auditing Information technology ; Management Davis, Chris VerfasserIn aut Schiller, Mike VerfasserIn aut Wrozek, Brian VerfasserIn aut |
spellingShingle | Kegerreis, Mike Davis, Chris Schiller, Mike Wrozek, Brian IT auditing using controls to protect information assets Electronic data processing Auditing Information technology Management Computer networks Security measures Computer security Computer Security Technologie de l'information ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electronic data processing ; Auditing Information technology ; Management |
title | IT auditing using controls to protect information assets |
title_auth | IT auditing using controls to protect information assets |
title_exact_search | IT auditing using controls to protect information assets |
title_full | IT auditing using controls to protect information assets Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek |
title_fullStr | IT auditing using controls to protect information assets Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek |
title_full_unstemmed | IT auditing using controls to protect information assets Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek |
title_short | IT auditing |
title_sort | it auditing using controls to protect information assets |
title_sub | using controls to protect information assets |
topic | Electronic data processing Auditing Information technology Management Computer networks Security measures Computer security Computer Security Technologie de l'information ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electronic data processing ; Auditing Information technology ; Management |
topic_facet | Electronic data processing Auditing Information technology Management Computer networks Security measures Computer security Computer Security Technologie de l'information ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electronic data processing ; Auditing Information technology ; Management |
work_keys_str_mv | AT kegerreismike itauditingusingcontrolstoprotectinformationassets AT davischris itauditingusingcontrolstoprotectinformationassets AT schillermike itauditingusingcontrolstoprotectinformationassets AT wrozekbrian itauditingusingcontrolstoprotectinformationassets |