IT auditing using controls to protect information assets

Saved in:
Bibliographic Details
Main Author: Davis, Chris (Christopher Michael)
Other Authors: Schiller, Mike, Wheeler, Kevin
Format: Book
Published: New York McGraw-Hill 2011
Edition:2nd ed
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-450589
020 # # |a 9780071742382 
020 # # |a 0071742387 
040 # # |a DLC  |d ITMB 
090 0 0 |a QA76.9.A93  |b D38 2011 
100 1 # |a Davis, Chris  |q (Christopher Michael) 
245 1 0 |a IT auditing  |b using controls to protect information assets  |c Chris Davis, Mike Schiller ; with Kevin Wheeler 
250 # # |a 2nd ed 
260 # # |a New York  |b McGraw-Hill  |c 2011 
300 # # |a xxix, 480 p.  |b ill.  |c 24 cm 
504 # # |a Includes bibliographical references and index 
650 # 0 |a Electronic data processing  |x Auditing 
650 # 0 |a Computer security 
650 # 0 |a Computer networks  |x Security measures 
700 1 # |a Schiller, Mike 
700 # # |a Wheeler, Kevin 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=450589 
964 # # |c BOK  |d 01 
998 # # |a 00250##a002.5.2||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||01700##a0011.2.2||