Auditor's guide to IT auditing [[electronic resource] /] / Richard E. Cascarino
| Auditor's guide to IT auditing [[electronic resource] /] / Richard E. Cascarino |
| Autore | Cascarino Richard |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
| Descrizione fisica | 1 online resource (456 p.) |
| Disciplina | 658/.0558 |
| Altri autori (Persone) | CascarinoRichard |
| Collana | Wiley corporate F&A series |
| Soggetto topico |
Electronic data processing - Auditing
Auditing |
| ISBN |
1-119-20372-4
1-118-23907-5 1-280-58854-3 9786613618375 1-118-22584-8 |
| Classificazione | BUS003000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Auditor's Guide to IT Auditing; Contents; Preface; PART I: IT AUDIT PROCESS; Chapter 1: Technology and Audit; Technology and Audit; Batch and Online Systems; Electronic Data Interchange; Electronic Business; Cloud Computing; Chapter 2: IT Audit Function Knowledge; Information Technology Auditing; What Is Management?; Management Process; Understanding the Organization's Business; Establishing the Needs; Identifying Key Activities; Establish Performance Objectives; Decide the Control Strategies; Implement and Monitor the Controls; Executive Management's Responsibility and Corporate Governance
Audit RoleConceptual Foundation; Professionalism within the IT Auditing Function; Relationship of Internal IT Audit to the External Auditor; Relationship of IT Audit to Other Company Audit Activities; Audit Charter; Charter Content; Outsourcing the IT Audit Activity; Regulation, Control, and Standards; Chapter 3: IT Risk and Fundamental Auditing Concepts; Computer Risks and Exposures; Effect of Risk; Audit and Risk; Audit Evidence; Conducting an IT Risk-Assessment Process; NIST SP 800 30 Framework; ISO 27005; The "Cascarino Cube"; Reliability of Audit Evidence; Audit Evidence Procedures Responsibilities for Fraud Detection and PreventionNotes; Chapter 4: Standards and Guidelines for IT Auditing; IIA Standards; Code of Ethics; Advisory; Aids; Standards for the Professional Performance of Internal Auditing; ISACA Standards; ISACA Code of Ethics; COSO: Internal Control Standards; BS 7799 and ISO 17799: IT Security; NIST; BSI Baselines; Note; Chapter 5: Internal Controls Concepts Knowledge; Internal Controls; Cost/Benefit Considerations; Internal Control Objectives; Types of Internal Controls; Systems of Internal Control; Elements of Internal Control Manual and Automated SystemsControl Procedures; Application Controls; Control Objectives and Risks; General Control Objectives; Data and Transactions Objectives; Program Control Objectives; Corporate IT Governance; COSO and Information Technology; Governance Frameworks; Notes; Chapter 6: Risk Management of the IT Function; Nature of Risk; Risk-Analysis Software; Auditing in General; Elements of Risk Analysis; Defining the Audit Universe; Computer System Threats; Risk Management; Notes; Chapter 7: Audit Planning Process; Benefits of an Audit Plan; Structure of the Plan; Types of Audit Chapter 8: Audit ManagementPlanning; Audit Mission; IT Audit Mission; Organization of the Function; Staffing; IT Audit as a Support Function; Planning; Business Information Systems; Integrated IT Auditor versus Integrated IT Audit; Auditees as Part of the Audit Team; Application Audit Tools; Advanced Systems; Specialist Auditor; IT Audit Quality Assurance; Chapter 9: Audit Evidence Process; Audit Evidence; Audit Evidence Procedures; Criteria for Success; Statistical Sampling; Why Sample?; Judgmental (or Non-Statistical) Sampling; Statistical Approach; Sampling Risk; Assessing Sampling Risk Planning a Sampling Application |
| Record Nr. | UNINA-9910141312103321 |
Cascarino Richard
|
||
| Hoboken, N.J., : Wiley, c2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Auditor's guide to IT auditing / / Richard E. Cascarino
| Auditor's guide to IT auditing / / Richard E. Cascarino |
| Autore | Cascarino Richard |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
| Descrizione fisica | 1 online resource (456 p.) |
| Disciplina | 658/.0558 |
| Altri autori (Persone) | CascarinoRichard |
| Collana | Wiley corporate F&A series |
| Soggetto topico |
Electronic data processing - Auditing
Auditing |
| ISBN |
9786613618375
9781119203728 1119203724 9781118239070 1118239075 9781280588549 1280588543 9781118225844 1118225848 |
| Classificazione | BUS003000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Auditor's Guide to IT Auditing; Contents; Preface; PART I: IT AUDIT PROCESS; Chapter 1: Technology and Audit; Technology and Audit; Batch and Online Systems; Electronic Data Interchange; Electronic Business; Cloud Computing; Chapter 2: IT Audit Function Knowledge; Information Technology Auditing; What Is Management?; Management Process; Understanding the Organization's Business; Establishing the Needs; Identifying Key Activities; Establish Performance Objectives; Decide the Control Strategies; Implement and Monitor the Controls; Executive Management's Responsibility and Corporate Governance
Audit RoleConceptual Foundation; Professionalism within the IT Auditing Function; Relationship of Internal IT Audit to the External Auditor; Relationship of IT Audit to Other Company Audit Activities; Audit Charter; Charter Content; Outsourcing the IT Audit Activity; Regulation, Control, and Standards; Chapter 3: IT Risk and Fundamental Auditing Concepts; Computer Risks and Exposures; Effect of Risk; Audit and Risk; Audit Evidence; Conducting an IT Risk-Assessment Process; NIST SP 800 30 Framework; ISO 27005; The "Cascarino Cube"; Reliability of Audit Evidence; Audit Evidence Procedures Responsibilities for Fraud Detection and PreventionNotes; Chapter 4: Standards and Guidelines for IT Auditing; IIA Standards; Code of Ethics; Advisory; Aids; Standards for the Professional Performance of Internal Auditing; ISACA Standards; ISACA Code of Ethics; COSO: Internal Control Standards; BS 7799 and ISO 17799: IT Security; NIST; BSI Baselines; Note; Chapter 5: Internal Controls Concepts Knowledge; Internal Controls; Cost/Benefit Considerations; Internal Control Objectives; Types of Internal Controls; Systems of Internal Control; Elements of Internal Control Manual and Automated SystemsControl Procedures; Application Controls; Control Objectives and Risks; General Control Objectives; Data and Transactions Objectives; Program Control Objectives; Corporate IT Governance; COSO and Information Technology; Governance Frameworks; Notes; Chapter 6: Risk Management of the IT Function; Nature of Risk; Risk-Analysis Software; Auditing in General; Elements of Risk Analysis; Defining the Audit Universe; Computer System Threats; Risk Management; Notes; Chapter 7: Audit Planning Process; Benefits of an Audit Plan; Structure of the Plan; Types of Audit Chapter 8: Audit ManagementPlanning; Audit Mission; IT Audit Mission; Organization of the Function; Staffing; IT Audit as a Support Function; Planning; Business Information Systems; Integrated IT Auditor versus Integrated IT Audit; Auditees as Part of the Audit Team; Application Audit Tools; Advanced Systems; Specialist Auditor; IT Audit Quality Assurance; Chapter 9: Audit Evidence Process; Audit Evidence; Audit Evidence Procedures; Criteria for Success; Statistical Sampling; Why Sample?; Judgmental (or Non-Statistical) Sampling; Statistical Approach; Sampling Risk; Assessing Sampling Risk Planning a Sampling Application |
| Altri titoli varianti | Auditor's guide to information technology auditing |
| Record Nr. | UNINA-9910820071803321 |
Cascarino Richard
|
||
| Hoboken, N.J., : Wiley, c2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
| Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki |
| Edizione | [6th ed.] |
| Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2007- |
| Descrizione fisica | 1 online resource (495 p.) |
| Disciplina |
658
658/.0558 |
| Altri autori (Persone) |
TiptonHarold F
NozakiMicki Krause |
| Collana | Information security management handbook |
| Soggetto topico |
Computer security - Management
Data protection |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-429-11284-X
1-283-59665-2 9786613909107 1-4398-9315-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover |
| Record Nr. | UNINA-9910461297403321 |
| Boca Raton : , : Auerbach Publications, , 2007- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
| Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki |
| Edizione | [6th ed.] |
| Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2007- |
| Descrizione fisica | 1 online resource (495 p.) |
| Disciplina |
658
658/.0558 |
| Altri autori (Persone) |
TiptonHarold F
NozakiMicki Krause |
| Collana | Information security management handbook |
| Soggetto topico |
Computer security - Management
Data protection |
| ISBN |
0-429-11284-X
1-283-59665-2 9786613909107 1-4398-9315-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover |
| Record Nr. | UNINA-9910790021503321 |
| Boca Raton : , : Auerbach Publications, , 2007- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
PBX security and forensics : a practical approach / / Iosif I. Androulidakis
| PBX security and forensics : a practical approach / / Iosif I. Androulidakis |
| Autore | Androulidakis Iosif I |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York, NY, : Springer, 2012, c2013 |
| Descrizione fisica | 1 online resource (108 p.) |
| Disciplina | 658/.0558 |
| Collana | SpringerBriefs in electrical and computer engineering |
| Soggetto topico |
Telephone - Private branch exchanges - Security measures
Telephone switching systems, Electronic |
| ISBN |
9786613844231
9781283531788 128353178X 9781461416562 1461416566 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions. |
| Record Nr. | UNINA-9910438038003321 |
Androulidakis Iosif I
|
||
| New York, NY, : Springer, 2012, c2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||