IT auditing using controls to protect information assets
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Book |
Language: | English |
Published: |
New York, NY
McGraw-Hill
2011
|
Edition: | 2nd ed. |
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01030pam a2200277 4500 | ||
---|---|---|---|
001 | 0000043079 | ||
008 | 130520s2011 nyu eng | ||
010 | |a 2011000207 | ||
020 | |a 9780071742382 | ||
050 | 0 | 0 | |a QA76.9.A93 |b .D38 2011 |
090 | 0 | 0 | |a QA76.9.A93 |b .D38 2011 |
100 | 1 | |a Davis, Chris |9 62761 | |
245 | 1 | 0 | |a IT auditing |b using controls to protect information assets |c /Chris Davis, Mike Schiller, Kevin Wheeler |
250 | |a 2nd ed. | ||
260 | |a New York, NY |b McGraw-Hill |c 2011 | ||
300 | |a xxix, 480 p. |b ill. |c 23 cm | ||
650 | 0 | |a Information auditing |9 62762 | |
650 | 0 | |a Computer security |9 401 | |
650 | 0 | |a Computer networks |x Security measures |9 1716 | |
650 | 0 | |a Electronic data processing |x Auditing |9 62763 | |
700 | 1 | |a Schiller, Mike |9 62764 | |
700 | 1 | |a Wheeler, Kevin |9 62765 | |
998 | 0 | 0 | |a rh/200513 |
999 | |c 42966 |d 42966 | ||
997 | |a FTMK | ||
952 | |0 0 |1 0 |2 lcc |4 0 |7 0 |9 64224 |a PLHKI |b PLHKI |c Open Shelf |d 2019-02-26 |e UMKO |g 166.52 |l 18 |o QA76 9 A93 D38 2011 |p 0000100933 |r 2016-11-02 |s 2016-11-02 |w 2019-02-26 |y BOK - OS |