1
by Davis, Chris
Published 2011
McGraw-Hill
Table of Contents: ...pt. 1. Audit overview -- pt. 2. Auditing techniques -- pt. 3. Frameworks, standards...

2
by Kegerreis, Mike, Davis, Chris, Schiller, Mike, Wrozek, Brian
Published 2020
McGraw-Hill
Subjects: ...Electronic data processing / Auditing / http://id.loc.gov/authorities/subjects/sh94001488...

3
by Vona, Leonard W.
Published 2011
Wiley
Table of Contents: ...Front Matter -- What Is a Fraud Audit? -- Professional Standards -- Fraud Scenarios...

4
by Gantz, Stephen D.
Published 2014
Syngress
Table of Contents: ...; Summary; References; Chapter 3. Internal Auditing; Information in this chapter:; Internal audit...

5
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ...The Automated Audit, Assertion, Assessment, and Assurance API 22 Recommended Controls 22 Risk...

6
by Jackson, Chris
Published 2010
Cisco Press
...This complete new guide to auditing network security is an indispensable resource for security...

7
by Rogers, Russ
Published 2008
Syngress

8
by Dunlap, E. Scott
Published 2011
CRC Press
Table of Contents: ...Section 1. The audit process -- section 2. The audit program -- section 3. Audit pathways...

9
by Peret, Philippe
Published 2023
CRC Press
Table of Contents: ...Audit -- Information system -- Information system audit -- Legal risks -- Operational risks...

10
by Patchong, Alain
Published 2016
CRC Press
Subjects: ...Management audit / http://id.loc.gov/authorities/subjects/sh85080350...

11
by Calderon, Paulino
Published 2021
Packt Publishing
Table of Contents: ... Pipelining, and Web Crawling Configuration Options Appendix B - Brute Force Password Auditing Options...

12
by McConnell, John H.
Published 2011
AMACOM, American Management Association
Subjects: ...Personnel management / Auditing / fast...

13
by Pale, Paulino Calderon
Published 2012
Packt Pub.
Table of Contents: ...Intro -- Nmap 6: Network Exploration and Security Auditing Cookbook -- Table of Contents -- Nmap 6...

14
by Long, Mark
Published 2015
O'Reilly

16
by Lad, Sagar
Published 2023
Apress
... of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your...

17
by Derry, Roger
Published 2012
Focal Press
... to Adobe®'s AuditionT 2.0. With Roger Derry's expert advice, you'll master Audition's basic tools...

18
by Ben-Natan, Ron
Published 2009
CRC Press
Table of Contents: ... Auditing -- 10. Mandatory and Administrator Auditing -- 11. Fine-Grained Auditing -- 12. Auditing Before...

19
by Vladimirov, Andrew A.
Published 2010
IT Governance Pub.
Table of Contents: ...Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing...