Table of Contents |
| IT Auditing-Using Controls to Protect Information Assets |
| Foreword |
| Introduction |
| Part I - Audit Overview |
| Chapter 1 | - | Building an Effective Internal IT Audit Function |
| Chapter 2 | - | The Audit Process |
| Part II - Auditing Techniques |
| Chapter 3 | - | Auditing Entity-Level Controls |
| Chapter 4 | - | Auditing Data Centers and Disaster Recovery |
| Chapter 5 | - | Auditing Switches, Routers, and Firewalls |
| Chapter 6 | - | Auditing Windows Operating Systems |
| Chapter 7 | - | Auditing Unix and Linux Operating Systems |
| Chapter 8 | - | Auditing Web Servers |
| Chapter 9 | - | Auditing Databases |
| Chapter 10 | - | Auditing Applications |
| Chapter 11 | - | Auditing WLAN and Mobile Devices |
| Chapter 12 | - | Auditing Company Projects |
| Part III - Frameworks, Standards, and Regulations |
| Chapter 13 | - | Frameworks and Standards |
| Chapter 14 | - | Regulations |
| Chapter 15 | - | Risk Management |
| Index |
| List of Figures |
| List of Tables |