𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Auditing Information Systems

✍ Scribed by Jack J. Champlain


Publisher
John Wiley
Year
2003
Tongue
English
Leaves
451
Edition
2nd ed
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


5 years ago I was asked to help internal auditors with a helpful audit program, so I decided to do some research and purchased this book over the internet.
I am not a professional reviewer, I lack the tactfulness to state my feelings about a book without offending at least the author. Well, here it is in a single statement - do not buy this book! -
It is too expensive for a new auditor and too basic for a seasoned auditor who should know about most of the points made in the book.
First chapter the author felt the urge to explain computers and used the term CPU, a box containing hardware. The original 1946 EDVAC may have been called a CPU. The author continues ..."there are thousands of them" what a joke. and if you keep reading how he explains memory you will start laughing uncontrollably " the more memory you have the more applications you can run" .
There are some good points made and planty of case studies but I ended up using articles I found on the internet for a great audit program based on BS7799.
I would recommend, reading books about ISO 2700x for creating great audits.

✦ Subjects


Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ΠΈΠΊΠ° ΠΈ Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Π°Ρ Ρ‚Π΅Ρ…Π½ΠΈΠΊΠ°;Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ;


πŸ“œ SIMILAR VOLUMES


Auditing Information Systems
✍ Mario Piattini πŸ“‚ Library πŸ“… 1999 πŸ› Idea Group Publishing 🌐 English

Society's growing dependence on information technology for survival has elevated the importance of controlling and evaluating information systems. A sound plan for auditing information systems and the technology that supports them is a necessity for organizations to improve the information syste

Auditing Information Systems
✍ Jack J. Champlain πŸ“‚ Library πŸ“… 2003 πŸ› Wiley 🌐 English

This text explains how to audit the controls and security over all types of information systems environments, and provides a detailed examination of contemporary auditing issues from privacy laws to computer forensics.