||10 of 10 people found the following review helpful.| Excellent book and well written/easy to understand|By Stealth1|This is the best book I've found so far on IT auditing. It is thorough, yet easy to understand. If you need detailed basics as well as experienced tip and want a book that's easy/interesting to read (as much as an IT auditing book can be), this is the one!
I can't imagine anyone being disappointed wi|About the Author||Chris Davis, CISA, CISSP, CCNP, served as a senior IT auditor for Texas Instruments. He teaches auditing and certification curriculum for Southern Methodist University and is the coauthor of Hacking Exposed: Computer Forensics an
Secure Your Systems Using the Latest IT Auditing Techniques
Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective ...
[PDF.sh30] IT Auditing Using Controls to Protect Information Assets, 2nd Edition (Networking & Communication - OMG) Rating: 4.62 (522 Votes)
IT Auditing Using Controls Chris Davis, Mike Schiller, Kevin Wheeler epub IT Auditing Using Controls Chris Davis, Mike Schiller, Kevin Wheeler pdf download IT Auditing Using Controls Chris Davis, Mike Schiller, Kevin Wheeler audiobook IT Auditing Using Controls Chris Davis, Mike Schiller, Kevin Wheeler review IT Auditing Using Controls Chris Davis, Mike Schiller, Kevin Wheeler summary IT Auditing Using Controls Chris Davis, Mike Schiller, Kevin Wheeler Free
You easily download any file type for your device.IT Auditing Using Controls to Protect Information Assets, 2nd Edition (Networking & Communication - OMG) | Chris Davis, Mike Schiller, Kevin Wheeler. I really enjoyed this book and have already told so many people about it!