IT auditing using controls to protect information assets
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Format: | Book |
| Language: | English |
| Published: |
New York
McGraw-Hill
2011
|
| Edition: | 2nd ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 44184 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219004306.0 | ||
| 008 | 110623s2011 xxua b 001 0 eng | ||
| 010 | |a 2011-000207 | ||
| 020 | |a 9780071742382 | ||
| 020 | |a 0071742387 | ||
| 039 | 9 | |a 201212030917 |b azraai |c 201206261042 |d shahrim |y 201106231501 |z rafizah | |
| 040 | |a UPNM | ||
| 090 | |a QA76.9 .A93 |b .D38 2011 | ||
| 100 | 1 | |a Davis, Chris |q (Christopher Michael) | |
| 245 | 1 | 0 | |a IT auditing |b using controls to protect information assets |c Chris Davis, Mike Schiller ; with Kevin Wheeler |
| 250 | |a 2nd ed. | ||
| 260 | |a New York |b McGraw-Hill |c 2011 | ||
| 300 | |a xxix, 480 p. |b ill. |c 24 cm. | ||
| 504 | |a Includes bibliographical references and index | ||
| 592 | |a 00003622 |b 19/06/2012 |c RM183.56 |h PDW | ||
| 650 | 0 | |a Electronic data processing |x auditing | |
| 650 | 0 | |a Information auditing | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 700 | 1 | |a Schiller, Mike | |
| 700 | 1 | |a Wheeler, Kevin | |
| 999 | |a vtls000044440 |c 44184 |d 44184 | ||


