IT auditing : using controls to protect information assets
(eBook)
Description
Also in this Series
More Details
Notes
Reviews from GoodReads
Citations
Kegerreis, M., Davis, C., Schiller, M., & Wrozek, B. (2020). IT auditing: using controls to protect information assets (Third edition.). McGraw-Hill.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Mike, Kegerreis et al.. 2020. IT Auditing: Using Controls to Protect Information Assets. McGraw-Hill.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Mike, Kegerreis et al.. IT Auditing: Using Controls to Protect Information Assets McGraw-Hill, 2020.
MLA Citation, 9th Edition (style guide)Kegerreis, Mike,, Chris Davis, Mike Schiller, and Brian Wrozek. IT Auditing: Using Controls to Protect Information Assets Third edition., McGraw-Hill, 2020.
Staff View
Grouping Information
Grouped Work ID | 4ee3ecac-722d-7959-1b73-7b12067abd7d-eng |
---|---|
Full title | it auditing using controls to protect information assets |
Author | kegerreis mike |
Grouping Category | book |
Last Update | 2024-09-06 16:31:08PM |
Last Indexed | 2024-09-26 02:47:32AM |
Book Cover Information
Image Source | syndetics |
---|---|
First Loaded | Sep 4, 2024 |
Last Used | Sep 24, 2024 |
Marc Record
First Detected | Jul 29, 2024 04:04:55 PM |
---|---|
Last File Modification Time | Sep 06, 2024 04:40:25 PM |
MARC Record
LEADER | 02422cam a2200505 i 4500 | ||
---|---|---|---|
001 | on1123174430 | ||
003 | OCoLC | ||
005 | 20240830103855.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 191015s2020 nyua ob 001 0 eng d | ||
019 | |a 1137805808|a 1273726743|a 1351840235 | ||
020 | |a 1260453235 | ||
020 | |a 9781260453232 | ||
020 | |z 1260453227 | ||
020 | |z 9781260453225 | ||
035 | |a (OCoLC)1123174430|z (OCoLC)1137805808|z (OCoLC)1273726743|z (OCoLC)1351840235 | ||
037 | |a CL0501000076|b Safari Books Online | ||
040 | |a UMI|b eng|e rda|e pn|c UMI|d OCLCF|d YDX|d COO|d N$T|d OCLCO|d OCLCQ|d OCLCO|d KSU|d OCLCQ|d OCLCO|d OCLCL | ||
049 | |a FMGA | ||
050 | 4 | |a QA76.9.A93 | |
082 | 0 | 4 | |a 657/.458|2 23 |
100 | 1 | |a Kegerreis, Mike,|e author. | |
245 | 1 | 0 | |a IT auditing :|b using controls to protect information assets /|c Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek. |
246 | 3 | |a Information technology auditing | |
250 | |a Third edition. | ||
264 | 1 | |a New York :|b McGraw-Hill,|c [2020] | |
264 | 4 | |c ©2020 | |
300 | |a 1 online resource (1 volume) :|b illustrations | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. --|c Edited summary from book. | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed October 14, 2019). | |
650 | 0 | |a Electronic data processing|x Auditing.|0 http://id.loc.gov/authorities/subjects/sh94001488 | |
650 | 0 | |a Information technology|x Management.|0 http://id.loc.gov/authorities/subjects/sh2008006980 | |
650 | 0 | |a Computer networks|x Security measures.|0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer security.|0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 2 | |a Computer Security | |
700 | 1 | |a Davis, Chris|q (Christopher Michael),|e author.|0 http://id.loc.gov/authorities/names/n2011004056 | |
700 | 1 | |a Schiller, Mike,|e author. | |
700 | 1 | |a Wrozek, Brian,|e author. | |
758 | |i has work:|a IT auditing (Text)|1 https://id.oclc.org/worldcat/entity/E39PCH7BkFdmqghmwxbYttYhpd|4 https://id.oclc.org/worldcat/ontology/hasWork | ||
856 | 4 | 0 | |u https://www.aclib.us/OReilly |