Information Security Audit: High-impact Strategies - What You Need To Know: Definitions, Adoptions, Impact, Benefits, Maturity, by Kevin RoebuckInformation Security Audit: High-impact Strategies - What You Need To Know: Definitions, Adoptions, Impact, Benefits, Maturity, by Kevin Roebuck

Information Security Audit: High-impact Strategies - What You Need To Know: Definitions, Adoptions…

byKevin Roebuck

Paperback | June 10, 2011

Pricing and Purchase Info

$59.50

Earn 298 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized to technical, physical and administrative. Auditing information security covers topics from auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different methods for auditing these areas.

When centered on the IT aspects of information security, it can be seen as a part of an information technology audit. It is often then referred to as an information technology security audit or a computer security audit. However, information security encompasses much more than IT.

This book is your ultimate resource for Information security audit. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Information security audit right away, covering: se drag & drop to reorder wiki pages and chapters, Information security audit, ACL (software company), COBIT, Code audit, David Coderre, Computer Aided Audit Tools, Computer forensics, Computer fraud, Computer Fraud and Abuse Act, Continuous controls monitoring, Datacenter star audit, Enterprise risk management, History of information technology auditing, Host protected area, Information technology audit, Information technology audit process, Erik Laykin, Mobile device forensics, National Information Infrastructure Protection Act, SekChek Classic, SekChek Local, Statement on Auditing Standards No. 99: Consideration of Fraud

This book explains in-depth the real drivers and workings of Information security audit. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Information security audit with the objectivity of experienced professionals.

Title:Information Security Audit: High-impact Strategies - What You Need To Know: Definitions, Adoptions…Format:PaperbackDimensions:86 pages, 11.69 × 8.27 × 0.18 inPublished:June 10, 2011Publisher:Emereo Pty LtdLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:174304559X

ISBN - 13:9781743045596

Look for similar items by category:

Reviews