Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
8Activity

Table Of Contents

Information technology audit
ACL (software company)
COBIT
Code audit
David Coderre
Computer Aided Audit Tools
Computer forensics
Computer fraud
Computer Fraud and Abuse Act
Continuous controls monitoring
Datacenter star audit
Enterprise risk management
History of information technology auditing
Host protected area
Information security audit
Information technology audit process
Information technology audit process:
Information Technology Audit Process Overview
Erik Laykin
Mobile device forensics
National Information Infrastructure Protection Act
SekChek Classic
SekChek Local
Statement on Auditing Standards No. 99: Consideration of Fraud
Article Sources and Contributors
Image Sources, Licenses and Contributors
License
P. 1
Information technology audit: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Information technology audit: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Ratings: (0)|Views: 505 |Likes:
Published by Emereo Publishing
An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.

IT audits are also known as "automated data processing (ADP) audits" and "computer audits". They were formerly called "electronic data processing (EDP) audits".

This book is your ultimate resource for Information technology audit. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Information technology audit right away, covering: Information technology audit, ACL (software company), COBIT, Code audit, David Coderre, Computer Aided Audit Tools, Computer forensics, Computer fraud, Computer Fraud and Abuse Act, Continuous controls monitoring, Datacenter star audit, Enterprise risk management, History of information technology auditing, Host protected area, Information security audit, Information technology audit process, Erik Laykin, Mobile device forensics, National Information Infrastructure Protection Act, SekChek Classic, SekChek Local, Statement on Auditing Standards No. 99: Consideration of Fraud

This book explains in-depth the real drivers and workings of Information technology audit. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Information technology audit with the objectivity of experienced professionals.
An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.

IT audits are also known as "automated data processing (ADP) audits" and "computer audits". They were formerly called "electronic data processing (EDP) audits".

This book is your ultimate resource for Information technology audit. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Information technology audit right away, covering: Information technology audit, ACL (software company), COBIT, Code audit, David Coderre, Computer Aided Audit Tools, Computer forensics, Computer fraud, Computer Fraud and Abuse Act, Continuous controls monitoring, Datacenter star audit, Enterprise risk management, History of information technology auditing, Host protected area, Information security audit, Information technology audit process, Erik Laykin, Mobile device forensics, National Information Infrastructure Protection Act, SekChek Classic, SekChek Local, Statement on Auditing Standards No. 99: Consideration of Fraud

This book explains in-depth the real drivers and workings of Information technology audit. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Information technology audit with the objectivity of experienced professionals.

More info:

Published by: Emereo Publishing on Aug 01, 2011
Copyright:Traditional Copyright: All rights reserved
List Price: $39.95

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
Full version available to subscribers
See more
See less

04/05/2014

You're Reading a Free Preview
Pages 5 to 87 are not shown in this preview.

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Nitin Mishra liked this
Joyce Pang liked this
windua liked this
Aatif_Saif_80 liked this

You're Reading a Free Preview

Download