Da: Greenworld Books, Arlington, TX, U.S.A.
Condizione: good. Fast Free Shipping â" Good condition book with a firm cover and clean, readable pages. Shows normal use, including some light wear or limited notes highlighting, yet remains a dependable copy overall. Supplemental items like CDs or access codes may not be included.
Da: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: Jenson Books Inc, Logan, UT, U.S.A.
perfect. Condizione: Very Good. A clean, cared for item that is unmarked and shows limited shelf wear.
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages.
Da: HPB-Red, Dallas, TX, U.S.A.
Perfect Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Unknown. Condizione: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Unknown. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Unknown. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Unknown. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Condizione: Very Good. Very Good Condition. Has some wear. Five star seller - Buy with confidence!
Da: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Da: Campus Bookstore, Denton, TX, U.S.A.
Paperback. Condizione: Good. May contain highlighting/underlining/notes/etc. May have used stickers on cover. Access codes and supplements are not guaranteed to be included with used books. Ships same or next day. Expedited shipping: 3-5 business days, Standard shipping: 4-14 business days.
Da: BookHolders, Towson, MD, U.S.A.
Condizione: Very Good. [ No Hassle 30 Day Returns ][ Ships Daily ] [ Underlining/Highlighting: NONE ] [ Writing: NONE ] [ Edition: Third ] Publisher: McGraw-Hill Education Pub Date: 9/30/2019 Binding: Paperback Pages: 576 Third edition.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition.
Da: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Da: Revaluation Books, Exeter, Regno Unito
EUR 41,55
Quantità: 1 disponibili
Aggiungi al carrelloPerfect Paperback. Condizione: Brand New. 2nd edition. 512 pages. 9.00x7.00x1.00 inches. In Stock.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls and cybersecurity programs Assess data centers and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Review big data and data repositories Assess end user computer devices, including PCs and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications and projects to find potential control weaknesses Learn best practices for auditing new technologies Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: ALLBOOKS1, Direk, SA, Australia
EUR 60,62
Quantità: 1 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 51,40
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
Editore: McGraw-Hill Education 2019-09-30, 2019
ISBN 10: 1260453227 ISBN 13: 9781260453225
Lingua: Inglese
Da: Chiron Media, Wallingford, Regno Unito
EUR 51,02
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 74,58
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 58,21
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: BennettBooksLtd, San Diego, NV, U.S.A.
paperback. Condizione: New. In shrink wrap. Looks like an interesting title!
Da: CitiRetail, Stevenage, Regno Unito
EUR 56,81
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls and cybersecurity programs Assess data centers and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Review big data and data repositories Assess end user computer devices, including PCs and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications and projects to find potential control weaknesses Learn best practices for auditing new technologies Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Da: moluna, Greven, Germania
EUR 63,52
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: New. Über den AutorrnrnnChris Davis, CISA, CISSP (Dallas, TX) is a senior IT auditor for Texas Instruments and author of the best-selling Hacking Exposed: Computer Forensics.nInhaltsverzeichnisPART 1: Audit Overvi.
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 99,25
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls and cybersecurity programs Assess data centers and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Review big data and data repositories Assess end user computer devices, including PCs and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications and projects to find potential control weaknesses Learn best practices for auditing new technologies Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Da: Rarewaves.com UK, London, Regno Unito
EUR 69,66
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value. Audit entity-level controls and cybersecurity programs. Assess data centers and disaster recovery. Examine switches, routers, and firewalls. Evaluate Windows, UNIX, and Linux operating systems. Audit Web servers and applications. Analyze databases and storage solutions. Review big data and data repositories. Assess end user computer devices, including PCs and mobile devices. Audit virtualized environments. Evaluate risks associated with cloud computing and outsourced operations. Drill down into applications and projects to find potential control weaknesses. Learn best practices for auditing new technologies. Use standards and frameworks, such as COBIT, ITIL, and ISO. Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI. Implement proven risk management practices.