Auditor's guide to IT auditing /

Step-by-step guide to successful implementation and control of IT systems & mdash; including the Cloud. Many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Audit...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Cascarino, Richard
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Hoboken, N.J. : Wiley, [2012]
Έκδοση:2nd ed.
Σειρά:Wiley corporate F & A.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 07272nam a2200997 4500
001 ocn785782707
003 OCoLC
005 20170124070150.1
006 m o d
007 cr cn|||||||||
008 111012s2012 nju ob 001 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d N$T  |d OCLCQ  |d CDX  |d TEFOD  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d YDXCP  |d OCLCQ  |d OCLCF  |d EBLCP  |d UMI  |d COO  |d YBM  |d AZU  |d VT2  |d DKDLA  |d LLB  |d TEFOD  |d DG1  |d OCLCQ  |d DEBBG  |d KSU  |d AZK  |d CNNLC  |d LOA  |d GrThAP 
019 |a 777374796  |a 794909722  |a 816351308  |a 841481392  |a 961599727  |a 962604944 
020 |a 9781118225844  |q (electronic bk.) 
020 |a 1118225848  |q (electronic bk.) 
020 |a 9781118239070  |q (electronic bk.) 
020 |a 1118239075  |q (electronic bk.) 
020 |a 9781119203728  |q (electronic bk.) 
020 |a 1119203724  |q (electronic bk.) 
020 |z 1118147618 
020 |z 9781118147610 
024 8 |a 9786613618375 
029 1 |a AU@  |b 000049569225 
029 1 |a AU@  |b 000050240017 
029 1 |a AU@  |b 000052899076 
029 1 |a CHNEW  |b 000618899 
029 1 |a DEBBG  |b BV040094860 
029 1 |a DEBBG  |b BV042740723 
029 1 |a DEBSZ  |b 372905668 
029 1 |a DEBSZ  |b 378284452 
029 1 |a DEBSZ  |b 397178689 
029 1 |a DEBSZ  |b 449272834 
029 1 |a DKDLA  |b 820120-katalog:000601055 
029 1 |a NZ1  |b 14973429 
029 1 |a DEBBG  |b BV043398958 
029 1 |a AU@  |b 000055807209 
035 |a (OCoLC)785782707  |z (OCoLC)777374796  |z (OCoLC)794909722  |z (OCoLC)816351308  |z (OCoLC)841481392  |z (OCoLC)961599727  |z (OCoLC)962604944 
037 |a CL0500000173  |b Safari Books Online 
037 |a 01DC2FC5-FEE6-4823-938D-CEB22AA4134A  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A93  |b C37 2012eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658/.0558  |2 23 
049 |a MAIN 
100 1 |a Cascarino, Richard. 
245 1 0 |a Auditor's guide to IT auditing /  |c Richard E. Cascarino. 
250 |a 2nd ed. 
264 1 |a Hoboken, N.J. :  |b Wiley,  |c [2012] 
264 4 |c ©2012 
300 |a 1 online resource (xxvi, 426 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a Wiley corporate F & A series 
500 |a Revised edition of: Auditor's guide to information systems auditing. 
500 |a Includes index. 
504 |a Includes bibliographical references and index. 
505 0 |a Auditor's Guide to IT Auditing; Contents; Preface; PART I: IT AUDIT PROCESS; Chapter 1: Technology and Audit; Technology and Audit; Batch and Online Systems; Electronic Data Interchange; Electronic Business; Cloud Computing; Chapter 2: IT Audit Function Knowledge; Information Technology Auditing; What Is Management?; Management Process; Understanding the Organization's Business; Establishing the Needs; Identifying Key Activities; Establish Performance Objectives; Decide the Control Strategies; Implement and Monitor the Controls; Executive Management's Responsibility and Corporate Governance. 
505 8 |a Audit Role conceptual Foundation; Professionalism within the IT Auditing Function; Relationship of Internal IT Audit to the External Auditor; Relationship of IT Audit to Other Company Audit Activities; Audit Charter; Charter Content; Outsourcing the IT Audit Activity; Regulation, Control, and Standards; Chapter 3: IT Risk and Fundamental Auditing Concepts; Computer Risks and Exposures; Effect of Risk; Audit and Risk; Audit Evidence; Conducting an IT Risk-Assessment Process; NIST SP 800 30 Framework; ISO 27005; The "Cascarino Cube"; Reliability of Audit Evidence; Audit Evidence Procedures. 
505 8 |a Responsibilities for Fraud Detection and Prevention notes; Chapter 4: Standards and Guidelines for IT Auditing; IIA Standards; Code of Ethics; Advisory; Aids; Standards for the Professional Performance of Internal Auditing; ISACA Standards; ISACA Code of Ethics; COSO: Internal Control Standards; BS 7799 and ISO 17799: IT Security; NIST; BSI Baselines; Note; Chapter 5: Internal Controls Concepts Knowledge; Internal Controls; Cost/Benefit Considerations; Internal Control Objectives; Types of Internal Controls; Systems of Internal Control; Elements of Internal Control. 
505 8 |a Manual and Automated Systems control Procedures; Application Controls; Control Objectives and Risks; General Control Objectives; Data and Transactions Objectives; Program Control Objectives; Corporate IT Governance; COSO and Information Technology; Governance Frameworks; Notes; Chapter 6: Risk Management of the IT Function; Nature of Risk; Risk-Analysis Software; Auditing in General; Elements of Risk Analysis; Defining the Audit Universe; Computer System Threats; Risk Management; Notes; Chapter 7: Audit Planning Process; Benefits of an Audit Plan; Structure of the Plan; Types of Audit. 
505 8 |a Chapter 8: Audit Management planning; Audit Mission; IT Audit Mission; Organization of the Function; Staffing; IT Audit as a Support Function; Planning; Business Information Systems; Integrated IT Auditor versus Integrated IT Audit; Auditees as Part of the Audit Team; Application Audit Tools; Advanced Systems; Specialist Auditor; IT Audit Quality Assurance; Chapter 9: Audit Evidence Process; Audit Evidence; Audit Evidence Procedures; Criteria for Success; Statistical Sampling; Why Sample?; Judgmental (or Non-Statistical) Sampling; Statistical Approach; Sampling Risk; Assessing Sampling Risk. 
520 |a Step-by-step guide to successful implementation and control of IT systems & mdash; including the Cloud. Many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Auditor's Guide to IT Auditing presents an easy, practical guide for auditors that can be applied to all computing environments. Follows the approach used by the Information System Audit and Control Association's model curriculum, making this book a practical approach to IS auditingServes as an excellent study gui. 
650 0 |a Electronic data processing  |x Auditing. 
650 0 |a Auditing. 
650 4 |a Computer security. 
650 4 |a Computer systems  |x Auditing. 
650 4 |a Computer science. 
650 4 |a Business. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Auditing.  |2 fast  |0 (OCoLC)fst00821166 
650 7 |a Electronic data processing  |x Auditing.  |2 fast  |0 (OCoLC)fst00906966 
655 4 |a Electronic books. 
655 7 |a Electronic books.  |2 local 
655 0 |a Electronic books. 
700 1 |a Cascarino, Richard.  |t Auditor's guide to information systems auditing. 
776 0 8 |i Print version:  |a Cascarino, Richard.  |t Auditor's guide to IT auditing.  |b 2nd ed.  |d Hoboken, N.J. : Wiley, ©2012  |w (DLC) 2011042683 
830 0 |a Wiley corporate F & A. 
856 4 0 |u https://doi.org/10.1002/9781119203728  |z Full Text via HEAL-Link 
994 |a 92  |b DG1