top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Auditor's guide to IT auditing [[electronic resource] /] / Richard E. Cascarino
Auditor's guide to IT auditing [[electronic resource] /] / Richard E. Cascarino
Autore Cascarino Richard
Edizione [2nd ed.]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (456 p.)
Disciplina 658/.0558
Altri autori (Persone) CascarinoRichard
Collana Wiley corporate F&A series
Soggetto topico Electronic data processing - Auditing
Auditing
ISBN 1-119-20372-4
1-118-23907-5
1-280-58854-3
9786613618375
1-118-22584-8
Classificazione BUS003000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Auditor's Guide to IT Auditing; Contents; Preface; PART I: IT AUDIT PROCESS; Chapter 1: Technology and Audit; Technology and Audit; Batch and Online Systems; Electronic Data Interchange; Electronic Business; Cloud Computing; Chapter 2: IT Audit Function Knowledge; Information Technology Auditing; What Is Management?; Management Process; Understanding the Organization's Business; Establishing the Needs; Identifying Key Activities; Establish Performance Objectives; Decide the Control Strategies; Implement and Monitor the Controls; Executive Management's Responsibility and Corporate Governance
Audit RoleConceptual Foundation; Professionalism within the IT Auditing Function; Relationship of Internal IT Audit to the External Auditor; Relationship of IT Audit to Other Company Audit Activities; Audit Charter; Charter Content; Outsourcing the IT Audit Activity; Regulation, Control, and Standards; Chapter 3: IT Risk and Fundamental Auditing Concepts; Computer Risks and Exposures; Effect of Risk; Audit and Risk; Audit Evidence; Conducting an IT Risk-Assessment Process; NIST SP 800 30 Framework; ISO 27005; The "Cascarino Cube"; Reliability of Audit Evidence; Audit Evidence Procedures
Responsibilities for Fraud Detection and PreventionNotes; Chapter 4: Standards and Guidelines for IT Auditing; IIA Standards; Code of Ethics; Advisory; Aids; Standards for the Professional Performance of Internal Auditing; ISACA Standards; ISACA Code of Ethics; COSO: Internal Control Standards; BS 7799 and ISO 17799: IT Security; NIST; BSI Baselines; Note; Chapter 5: Internal Controls Concepts Knowledge; Internal Controls; Cost/Benefit Considerations; Internal Control Objectives; Types of Internal Controls; Systems of Internal Control; Elements of Internal Control
Manual and Automated SystemsControl Procedures; Application Controls; Control Objectives and Risks; General Control Objectives; Data and Transactions Objectives; Program Control Objectives; Corporate IT Governance; COSO and Information Technology; Governance Frameworks; Notes; Chapter 6: Risk Management of the IT Function; Nature of Risk; Risk-Analysis Software; Auditing in General; Elements of Risk Analysis; Defining the Audit Universe; Computer System Threats; Risk Management; Notes; Chapter 7: Audit Planning Process; Benefits of an Audit Plan; Structure of the Plan; Types of Audit
Chapter 8: Audit ManagementPlanning; Audit Mission; IT Audit Mission; Organization of the Function; Staffing; IT Audit as a Support Function; Planning; Business Information Systems; Integrated IT Auditor versus Integrated IT Audit; Auditees as Part of the Audit Team; Application Audit Tools; Advanced Systems; Specialist Auditor; IT Audit Quality Assurance; Chapter 9: Audit Evidence Process; Audit Evidence; Audit Evidence Procedures; Criteria for Success; Statistical Sampling; Why Sample?; Judgmental (or Non-Statistical) Sampling; Statistical Approach; Sampling Risk; Assessing Sampling Risk
Planning a Sampling Application
Record Nr. UNINA-9910141312103321
Cascarino Richard  
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Auditor's guide to IT auditing / / Richard E. Cascarino
Auditor's guide to IT auditing / / Richard E. Cascarino
Autore Cascarino Richard
Edizione [2nd ed.]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (456 p.)
Disciplina 658/.0558
Altri autori (Persone) CascarinoRichard
Collana Wiley corporate F&A series
Soggetto topico Electronic data processing - Auditing
Auditing
ISBN 1-119-20372-4
1-118-23907-5
1-280-58854-3
9786613618375
1-118-22584-8
Classificazione BUS003000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Auditor's Guide to IT Auditing; Contents; Preface; PART I: IT AUDIT PROCESS; Chapter 1: Technology and Audit; Technology and Audit; Batch and Online Systems; Electronic Data Interchange; Electronic Business; Cloud Computing; Chapter 2: IT Audit Function Knowledge; Information Technology Auditing; What Is Management?; Management Process; Understanding the Organization's Business; Establishing the Needs; Identifying Key Activities; Establish Performance Objectives; Decide the Control Strategies; Implement and Monitor the Controls; Executive Management's Responsibility and Corporate Governance
Audit RoleConceptual Foundation; Professionalism within the IT Auditing Function; Relationship of Internal IT Audit to the External Auditor; Relationship of IT Audit to Other Company Audit Activities; Audit Charter; Charter Content; Outsourcing the IT Audit Activity; Regulation, Control, and Standards; Chapter 3: IT Risk and Fundamental Auditing Concepts; Computer Risks and Exposures; Effect of Risk; Audit and Risk; Audit Evidence; Conducting an IT Risk-Assessment Process; NIST SP 800 30 Framework; ISO 27005; The "Cascarino Cube"; Reliability of Audit Evidence; Audit Evidence Procedures
Responsibilities for Fraud Detection and PreventionNotes; Chapter 4: Standards and Guidelines for IT Auditing; IIA Standards; Code of Ethics; Advisory; Aids; Standards for the Professional Performance of Internal Auditing; ISACA Standards; ISACA Code of Ethics; COSO: Internal Control Standards; BS 7799 and ISO 17799: IT Security; NIST; BSI Baselines; Note; Chapter 5: Internal Controls Concepts Knowledge; Internal Controls; Cost/Benefit Considerations; Internal Control Objectives; Types of Internal Controls; Systems of Internal Control; Elements of Internal Control
Manual and Automated SystemsControl Procedures; Application Controls; Control Objectives and Risks; General Control Objectives; Data and Transactions Objectives; Program Control Objectives; Corporate IT Governance; COSO and Information Technology; Governance Frameworks; Notes; Chapter 6: Risk Management of the IT Function; Nature of Risk; Risk-Analysis Software; Auditing in General; Elements of Risk Analysis; Defining the Audit Universe; Computer System Threats; Risk Management; Notes; Chapter 7: Audit Planning Process; Benefits of an Audit Plan; Structure of the Plan; Types of Audit
Chapter 8: Audit ManagementPlanning; Audit Mission; IT Audit Mission; Organization of the Function; Staffing; IT Audit as a Support Function; Planning; Business Information Systems; Integrated IT Auditor versus Integrated IT Audit; Auditees as Part of the Audit Team; Application Audit Tools; Advanced Systems; Specialist Auditor; IT Audit Quality Assurance; Chapter 9: Audit Evidence Process; Audit Evidence; Audit Evidence Procedures; Criteria for Success; Statistical Sampling; Why Sample?; Judgmental (or Non-Statistical) Sampling; Statistical Approach; Sampling Risk; Assessing Sampling Risk
Planning a Sampling Application
Record Nr. UNINA-9910820071803321
Cascarino Richard  
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-
Descrizione fisica 1 online resource (495 p.)
Disciplina 658
658/.0558
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Collana Information security management handbook
Soggetto topico Computer security - Management
Data protection
Soggetto genere / forma Electronic books.
ISBN 0-429-11284-X
1-283-59665-2
9786613909107
1-4398-9315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910461297403321
Boca Raton : , : Auerbach Publications, , 2007-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-
Descrizione fisica 1 online resource (495 p.)
Disciplina 658
658/.0558
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Collana Information security management handbook
Soggetto topico Computer security - Management
Data protection
ISBN 0-429-11284-X
1-283-59665-2
9786613909107
1-4398-9315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910790021503321
Boca Raton : , : Auerbach Publications, , 2007-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-
Descrizione fisica 1 online resource (495 p.)
Disciplina 658
658/.0558
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Collana Information security management handbook
Soggetto topico Computer security - Management
Data protection
ISBN 0-429-11284-X
1-283-59665-2
9786613909107
1-4398-9315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910813980803321
Boca Raton : , : Auerbach Publications, , 2007-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
PBX security and forensics : a practical approach / / Iosif I. Androulidakis
PBX security and forensics : a practical approach / / Iosif I. Androulidakis
Autore Androulidakis Iosif I
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, NY, : Springer, 2012, c2013
Descrizione fisica 1 online resource (108 p.)
Disciplina 658/.0558
Collana SpringerBriefs in electrical and computer engineering
Soggetto topico Telephone - Private branch exchanges - Security measures
Telephone switching systems, Electronic
ISBN 1-283-53178-X
9786613844231
1-4614-1656-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.
Record Nr. UNINA-9910438038003321
Androulidakis Iosif I  
New York, NY, : Springer, 2012, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui