IT auditing using controls to protect information assets
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Book |
Published: |
New York
McGraw-Hill
2011
|
Edition: | 2nd ed |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-450589 | ||
020 | # | # | |a 9780071742382 |
020 | # | # | |a 0071742387 |
040 | # | # | |a DLC |d ITMB |
090 | 0 | 0 | |a QA76.9.A93 |b D38 2011 |
100 | 1 | # | |a Davis, Chris |q (Christopher Michael) |
245 | 1 | 0 | |a IT auditing |b using controls to protect information assets |c Chris Davis, Mike Schiller ; with Kevin Wheeler |
250 | # | # | |a 2nd ed |
260 | # | # | |a New York |b McGraw-Hill |c 2011 |
300 | # | # | |a xxix, 480 p. |b ill. |c 24 cm |
504 | # | # | |a Includes bibliographical references and index |
650 | # | 0 | |a Electronic data processing |x Auditing |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Computer networks |x Security measures |
700 | 1 | # | |a Schiller, Mike |
700 | # | # | |a Wheeler, Kevin |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=450589 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00250##a002.5.2||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||01700##a0011.2.2|| |