LEADER 01009nam 2200373 450 001 9910812664103321 005 20230809231750.0 010 $a1-78682-303-9 035 $a(CKB)4100000006672793 035 $a(MiAaPQ)EBC5283746 035 $a(EXLCZ)994100000006672793 100 $a20180925d2017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aVenus in fur /$fDavid Ives 210 1$aLondon, England :$cOberon Books,$d2017. 215 $a1 online resource (59 pages) 311 $a1-78682-302-0 606 $aActresses$vDrama 606 $aTheatrical producers and directors$vDrama 615 0$aActresses 615 0$aTheatrical producers and directors 676 $a812.54 700 $aIves$b David$01673332 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910812664103321 996 $aVenus in fur$94105232 997 $aUNINA LEADER 03458nam 2200925 a 450 001 9910140898703321 005 20230725025417.0 010 $a9786613905574 010 $a9781283593120 010 $a1283593122 010 $a9780470877418 010 $a0470877413 010 $a9781118269138 010 $a1118269136 010 $a9781118035771 010 $a1118035771 010 $a9780470877685 010 $a0470877685 010 $a9780470877678 010 $a0470877677 035 $a(CKB)2670000000055154 035 $a(EBL)624573 035 $a(OCoLC)682625155 035 $a(SSID)ssj0000421222 035 $a(PQKBManifestationID)11261628 035 $a(PQKBTitleCode)TC0000421222 035 $a(PQKBWorkID)10413001 035 $a(PQKB)10591859 035 $a(SSID)ssj0000992366 035 $a(PQKBManifestationID)11531518 035 $a(PQKBTitleCode)TC0000992366 035 $a(PQKBWorkID)10934286 035 $a(PQKB)10773792 035 $a(MiAaPQ)EBC4028446 035 $a(MiAaPQ)EBC624573 035 $a(MiAaPQ)EBC947737 035 $a(MiAaPQ)EBC4957367 035 $a(Au-PeEL)EBL624573 035 $a(CaPaEBR)ebr10469768 035 $a(Au-PeEL)EBL4957367 035 $a(CaONFJC)MIL390557 035 $a(OCoLC)817811897 035 $a(Perlego)1014250 035 $a(EXLCZ)992670000000055154 100 $a20100421d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIT audit, control, and security /$fRobert Moeller 205 $a1st ed. 210 $aHoboken, N.J. $cWiley$dc2010 215 $a1 online resource (696 p.) 225 1 $aWiley Corporate F&A ;$vv.13 300 $aDescription based upon print version of record. 311 08$a9780471406761 311 08$a0471406767 320 $aIncludes bibliographical references and index. 327 $apt. 1. Auditing internal controls in an IT environment -- pt. 2. Auditing IT general controls -- pt. 3. Auditing and testing IT application controls -- pt. 4. Importance of IT governance. 330 $aWhen it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external 410 0$aWiley corporate F & A series. 606 $aInformation technology$xAuditing 606 $aElectronic data processing departments$xAuditing 606 $aComputer security 606 $aComputer networks$xSecurity measures 615 0$aInformation technology$xAuditing. 615 0$aElectronic data processing departments$xAuditing. 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 676 $a658.4/78 686 $a85.25$2bcl 700 $aMoeller$b Robert R$0724549 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910140898703321 996 $aIT audit, control, and security$91910949 997 $aUNINA