IT Auditing: Using Controls to Protect Information Assets (Paperback)
Chris Davis, Mike Schiller, Kevin Wheeler
- 出版商: McGraw-Hill Education
- 出版日期: 2006-12-22
- 售價: $2,210
- 貴賓價: 9.5 折 $2,100
- 語言: 英文
- 頁數: 387
- 裝訂: Paperback
- ISBN: 0072263431
- ISBN-13: 9780072263435
-
相關分類:
Cisco、資訊安全
已過版
買這商品的人也買了...
-
$1,560$1,482 -
$1,379Ia-64 and Elementary Functions: Speed and Precision
-
$990The FreeBSD Corporate Networker's Guide
-
$1,850$1,758 -
$1,750$1,663 -
$399Beginning Visual Basic .NET Databases
-
$1,880$1,786 -
$880$704 -
$825Automating Unix and Linux Administration (Paperback)
-
$780$702 -
$580$458 -
$650$507 -
$450$383 -
$980$774 -
$680$537 -
$720$569 -
$1,200$948 -
$580$493 -
$580$493 -
$980Object-Oriented & Classical Software Engineering, 7/e (IE) (美國版ISBN:0073191264)
-
$600$480 -
$2,060$1,957 -
$1,680Voice Over WLANS: The Complete Guide
-
$399Programming Clojure (Paperback)
-
$2,100$1,995
相關主題
商品描述
Description
Protect Your Systems with Proven IT Auditing Strategies
"A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
Build and maintain an IT audit function with maximum effectiveness and value
Implement best practice IT audit processes and controls Analyze UNIX-, Linux-, and Windows-based operating systems Audit network routers, switches, firewalls, WLANs, and mobile devices Evaluate entity-level controls, data centers, and disaster recovery plans Examine Web servers, platforms, and applications for vulnerabilities Review databases for critical controls- Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
Implement sound risk analysis and risk management practices Drill down into applications to find potential control weaknesses
Table of Contents
Section I: Audit Overview
Chapter 1. Building an Effective Internal IT Audit Function
Chapter 2. The Audit Process
Section II: Auditing Techniques
Chapter 3. Auditing Entity Level Controls
Chapter 4. Auditing Data Centers and Disaster Recovery
Chapter 5. Auditing Routers, Switches, and Firewalls
Chapter 6. Auditing Windows Operating Systems
Chapter 7. Auditing UNIX, Solaris, and Linux Operating Systems
Chapter 8. Auditing Web Servers, Mail Servers, and Proxies
Chapter 9. Auditing Databases
Chapter 10. Auditing Applications
Chapter 11. Auditing WLAN and Mobile Devices
Chapter 12. Auditing Company Projects
Section III: Standards, Frameworks, and Regulations
Chapter 13. Standards and Frameworks
Chapter 14. Regulations
APPENDIX A. DETAILED RISK ANALYSIS TECHNIQUES
APPENDIX B: AUDITING REMOTE SYSTEMS
GLOSSARY
商品描述(中文翻譯)
描述
保護您的系統,使用經過驗證的IT審計策略
“審計師和IT專業人員必備。” -Doug Dexter, CISSP-ISSMP, CISA, 審計團隊負責人,思科系統公司
計劃並管理一個有效的IT審計計劃,使用這個全面資源中包含的深入信息。由經驗豐富的IT審計和安全專業人員撰寫,《IT審計:使用控制保護信息資產》涵蓋了最新的審計工具,並提供現實世界的示例,可立即使用的檢查清單和有價值的模板。在這裡,您將學習如何分析Windows、UNIX和Linux系統;保護數據庫;檢查無線網絡和設備;以及審計應用程序。此外,您還將獲得有關法律標準和實踐、隱私和道德問題以及CobiT標準的最新信息。
建立並維護具有最大效益和價值的IT審計功能
實施最佳實踐的IT審計流程和控制
分析基於UNIX、Linux和Windows的操作系統
審計網絡路由器、交換機、防火牆、無線局域網和移動設備
評估實體級控制、數據中心和災難恢復計劃
檢查Web服務器、平台和應用程序的漏洞
審查關鍵控制的數據庫
使用COSO、CobiT、ITIL、ISO和NSA INFOSEC方法
實施健全的風險分析和風險管理實踐
深入應用程序,尋找潛在的控制弱點
目錄
第一部分:審計概述
第1章 建立有效的內部IT審計功能
第2章 審計流程
第二部分:審計技術
第3章 審計實體級控制
第4章 審計數據中心和災難恢復
第5章 審計路由器、交換機和防火牆
第6章 審計Windows操作系統
第7章 審計UNIX、Solaris和Linux操作系統
第8章 審計Web服務器、郵件服務器和代理
第9章 審計數據庫
第10章 審計應用程序
第11章 審計無線局域網和移動設備
第12章 審計公司項目
第三部分:標準、框架和法規
第13章 標準和框架
第14章 法規
附錄A:詳細風險分析技術
附錄B:審計遠程系統
詞彙表