1
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ...The Automated Audit, Assertion, Assessment, and Assurance API 22 Recommended Controls 22 Risk...

2
by Kenyon, Bridget
Published 2024
IT Governance Publishing
Subjects: ...Business enterprises / Computer networks / Security measures / Auditing...

3
by Singleton, Tommie
Published 2011
AICPA
Subjects: ...Auditing / Data processing / http://id.loc.gov/authorities/subjects/sh94001483...

4
by Calder, Alan
Published 2009
IT Governance
Subjects: ...IT audit...

5
by Calder, Alan
Published 2010
IT Governance Pub.
Subjects: ...Business enterprises / Computer networks / Security measures / Auditing / Dictionaries...

6
by Brown, Jeffrey W.
Published 2023
CRC Press
...Security, audit and leadership series...

7
by Mager, David
Published 2010
Berrett-Koehler Publishers
Table of Contents: ...Leadership : greening from the top -- Audits : measuring where you are -- The plan : implementing...

8
by Crawley, Kim
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ...Log Early, Log Often -- Prepare for Vulnerability Assessments and Security Audits -- A Concise...

9
by Wun-Young, Leslie
Published 2009
Syngress Pub.
Table of Contents: ... Change Management; Disaster Recovery; Regulatory Compliance, Auditing, Governance & Risk Compliance...

10
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ... -- ch. 16. Crafting a security policy -- ch. 17. Performing security analyses and audits -- ch. 18...

11
by Bücker, Axel, Annas, Andrew, Faustini, Alessandro, Sanui, Takayoshi
Published 2006
IBM Corporation
... challenges addressing enhanced auditing and reporting, and designing and creating your own self-care/self...

12
by L'Esteve, Ron C.
Published 2023
Apress
Table of Contents: ....Designing a Secure Data Lake -- 12. Administering and Auditing the Cloud -- 13. Collaborating with Cloud...

13
by Bacon, Ryan, Crawley, Kim
Published 2021
O'Reilly Media, Inc.
... visibility for auditing, compliance, and management Continuous, uninterrupted network uptime A fully modern...

14
by Rehberger, Johann
Published 2020
Packt Publishing
... with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end...

15
by Calder, Alan
Published 2023
IT Governance Ltd
Table of Contents: ... 18: Internal audits -- Chapter 19: Malware protection -- Chapter 20: Network and communications...

16
by Brown, William
Published 2008
IBM Press/Pearson plc

17
by Dean, Paula
Published 2013
McGraw-Hill
Table of Contents: ... and Configuration Auditing Tools -- Conclusion -- Chapter 2: Data Management with Application Designer -- Abstract...

18
by Baines, Peter
Published 2015
John Wiley and Sons Australia, Ltd
Table of Contents: ... be a deductible gift recipient (DGR); Location of the charity; Access to audited annual financial...

19
by Simmons, Andrea C.
Published 2012
IT Governance Pub.
Table of Contents: ... and image; Password management (again); Consumerisation; Third-party management; Audit log management...

20
Published 2013
Wiley
Table of Contents: ..., SOC2, ISO, AND SOX -- (a) Audit Formats -- (b) Audit Reports -- (c) Audit Management -- (d) Role...