• Написана: 2012
  • Язык: en
  • Издательство: Gardners Books
  • Опубликовано: 2014
Авторы / Писатели: ,

Information technology audit: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Р2600.00
3.4 / 18440 оценок
средняя цена в магазинах

Форматы книг для скачивания и чтения:

Android
iPhone/iPad
Windows
Компьютер
Планшет
Читалка
Узнать как читать книги в формате:  fb2  djvu  epub  pdf  txt  rtf  doc  mobi  html 
Подробнее о издании
  • Объём: 153 страницы

Обзор книги "Information technology audit: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors Kevin Roebuck"

An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. IT audits are also known as &quote;&quote;automated data processing (ADP) audits&quote;&quote; and &quote;&quote;computer audits&quote;&quote;. They were formerly called &quote;&quote;electronic data processing (EDP) audits&quote;&quote;. This book is your ultimate resource for Information technology audit. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Information technology audit right away, covering: Information technology audit, ACL (software company), COBIT, Code audit, David Coderre, Computer Aided Audit Tools, Computer forensics, Computer fraud, Computer Fraud and Abuse Act, Continuous controls monitoring, Datacenter star audit, Enterprise risk management, History of information technology auditing, Host protected area, Information security audit, Information technology audit process, Erik Laykin, Mobile device forensics, National Information Infrastructure Protection Act, SekChek Classic, SekChek Local, Statement on Auditing Standards No. 99: Consideration of Fraud This book explains in-depth the real drivers and workings of Information technology audit. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Information technology audit with the objectivity of experienced professionals.

Отзывы, обзоры и комментарии книги (0):

Не менее 120 символов (0 / 120)
Отзывы
Дорогой читатель, Мы будем безмерно рады, если вы зарегистрируетесь у нас на сайте, оставите свой комментарий или просто поделитесь страницей в соц. сетях. За это вам будет хороший бонус...