IT auditing using controls to protect information assets

Bibliographic Details
Main Authors: Davis, Chris (Christopher Michael) (Author), Schiller, Mike (Author), Wheeler, Kevin (Author)
Format: Book
Language:English
Published: New York McGraw-Hill c2011
Edition:2nd ed
Subjects:
Online Access:McGraw Hill

MARC

LEADER 00000cam a2200000 7i4500
001 0000087413
008 141112s2011 nyu eng
020 |a 0071742387 
020 |a 0071742395 (e-book) 
020 |a 9780071742382 
020 |a 9780071742399 (e-book) 
050 0 0 |a QA76.9.A93  |b D38 2011 
090 0 0 |a QA76.9.A93  |b D38 2011 
100 1 |a Davis, Chris  |q (Christopher Michael)  |e author 
245 1 0 |a IT auditing  |b using controls to protect information assets  |h electronic resource  |c Chris Davis, Mike Schiller ; with Kevin Wheeler 
250 |a 2nd ed 
260 |a New York  |b McGraw-Hill  |c c2011 
300 |a 1 online resource (xxix, 480 p.)  |b ill 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 0 |a Electronic data processing  |x Auditing 
650 0 |a Information auditing 
700 1 |a Schiller, Mike  |e author 
700 1 |a Wheeler, Kevin  |e author 
856 4 0 |3 McGraw Hill  |u http://mhebooklibrary.com/doi/book/10.1036/9780071742399 
999 |a 1000163076  |b Electronic Book  |c Electronic Resource  |e Gong Badak Campus