IT auditing using controls to protect information assets

Saved in:
Bibliographic Details
Main Author: Davis, Chris (Christopher Michael)
Other Authors: Schiller, Mike, Wheeler, Kevin
Format: Book
Language:English
Published: New York McGraw-Hill 2011
Edition:2nd ed.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 44184
003 MY-KLNDU
005 20241219004306.0
008 110623s2011 xxua b 001 0 eng
010 |a 2011-000207 
020 |a 9780071742382 
020 |a 0071742387 
039 9 |a 201212030917  |b azraai  |c 201206261042  |d shahrim  |y 201106231501  |z rafizah 
040 |a UPNM 
090 |a QA76.9 .A93  |b .D38 2011 
100 1 |a Davis, Chris  |q (Christopher Michael) 
245 1 0 |a IT auditing  |b using controls to protect information assets  |c Chris Davis, Mike Schiller ; with Kevin Wheeler 
250 |a 2nd ed. 
260 |a New York  |b McGraw-Hill  |c 2011 
300 |a xxix, 480 p.  |b ill.  |c 24 cm. 
504 |a Includes bibliographical references and index 
592 |a 00003622  |b 19/06/2012  |c RM183.56  |h PDW 
650 0 |a Electronic data processing  |x auditing 
650 0 |a Information auditing 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
700 1 |a Schiller, Mike 
700 1 |a Wheeler, Kevin 
999 |a vtls000044440  |c 44184  |d 44184