000 08367cam a2200973 i 4500
001 ocn940570632
003 OCoLC
005 20240523125539.0
006 m o d
007 cr cnu---unuuu
008 160223s2016 caua o 000 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dOCLCO
_dIDEBK
_dN$T
_dTEFOD
_dYDXCP
_dDEBSZ
_dAZK
_dEBLCP
_dCHVBK
_dIDB
_dUBY
_dMERUC
_dDG1
_dYDX
_dOTZ
_dOCLCQ
_dUPM
_dCOO
_dOCLCQ
_dOCLCO
_dUMI
_dOCLCA
_dBUF
_dOCLCQ
_dHCO
_dWRM
_dOCLCF
_dOCLCQ
_dWYU
_dLVT
_dU3W
_dOCLCQ
_dESU
_dAU@
_dUKAHL
_dOCLCQ
_dOCL
_dUKMGB
_dOCLCQ
_dOCLCO
_dCOM
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
015 _aGBB636620
_2bnb
016 7 _a017768291
_2Uk
019 _a941434600
_a941696473
_a961514997
_a1008993470
_a1076648254
_a1121245844
_a1126072710
020 _a9781119419211
_q(electronic bk. ;
_qoBook)
020 _a1119419212
_q(electronic bk. ;
_qoBook)
020 _a9781119056256
_q(electronic bk.)
020 _a111905625X
_q(electronic bk.)
020 _a9781119056409
_q(electronic bk.)
020 _a1119056403
_q(electronic bk.)
020 _z9781119056249
020 _z1119056241
024 8 _a9781119056249
029 1 _aCHNEW
_b000895250
029 1 _aCHNEW
_b000957238
029 1 _aCHVBK
_b488705762
029 1 _aDEBBG
_bBV043628934
029 1 _aDEBSZ
_b473885530
029 1 _aDEBSZ
_b491394616
029 1 _aGBVCP
_b1002764742
029 1 _aUKMGB
_b017768291
035 _a(OCoLC)940570632
_z(OCoLC)941434600
_z(OCoLC)941696473
_z(OCoLC)961514997
_z(OCoLC)1008993470
_z(OCoLC)1076648254
_z(OCoLC)1121245844
_z(OCoLC)1126072710
037 _aA912D3FE-40E3-4594-8FE4-668BD7211DA7
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aQA76.3
_b.C3445 2016
072 7 _aCOM
_x060040
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aCannon, David L.,
_d1962-
_eauthor.
_1https://id.oclc.org/worldcat/entity/E39PCjDpWrkcbwbpyQy8Xp4Qbd
245 1 0 _aCISA :
_bCertified Information Systems Auditor study guide /
_cDavid Cannon with Brian T. O'Hara and Allen Keele.
246 3 _aCertified Information Systems Auditor study guide
250 _aFourth edition.
264 1 _aSan Francisco, CA :
_bSybex,
_c[2016]
264 4 _c�2016
300 _a1 online resource :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
588 0 _aPrint version record.
520 _a"The industry-leading study guide for the CISA exam, fully updated More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated twice a year, and this is the most up-to-date book available to prepare aspiring CISAs for the next exam. CISAs are among the five highest-paid IT security professionals; more than 27,000 take the exam each year and the numbers are growing Standards are updated twice a year, and this book offers the most up-to-date coverage as well as the proven Sybex approach that breaks down the content, tasks, and knowledge areas of the exam to cover every detail. Covers the IS audit process, IT governance, systems and infrastructure lifecycle management, IT service delivery and support, protecting information assets, disaster recovery, and more. Anyone seeking Certified Information Systems Auditor status will be fully prepared for the exam with the detailed information and approach found in this book."--
_cProvided by publisher.
505 0 _aCISA: Certified Information Systems Auditor: Study Guide; Contents; Introduction; Assessment Test; Chapter 1 Secrets of a Successful Auditor; Understanding the Demand for IS Audits; Executive Misconduct; More Regulation Ahead; Basic Regulatory Objective; Governance Is Leadership; Three Types of Data Target Different Uses; Audit Results Indicate the Truth; Understanding Policies, Standards, Guidelines, and Procedures; Understanding Professional Ethics; Following the ISACA Professional Code; Preventing Ethical Conflicts; Understanding the Purpose of an Audit; Classifying General Types of Audits.
505 8 _aDetermining Differences in Audit ApproachUnderstanding the Auditor's Responsibility; Comparing Audits to Assessments; Differentiating between Auditor and Auditee Roles; Applying an Independence Test; Implementing Audit Standards; Where Do Audit Standards Come From?; Understanding the Various Auditing Standards; Specific Regulations Defining Best Practices; Audits to Prove Financial Integrity; Auditor Is an Executive Position; Understanding the Importance of Auditor Confidentiality; Working with Lawyers; Working with Executives; Working with IT Professionals; Retaining Audit Documentation.
505 8 _aProviding Good Communication and IntegrationUnderstanding Leadership Duties; Planning and Setting Priorities; Providing Standard Terms of Reference; Dealing with Conflicts and Failures; Identifying the Value of Internal and External Auditors; Understanding the Evidence Rule; Stakeholders: Identifying Whom You Need to Interview; Understanding the Corporate Organizational Structure; Identifying Roles in a Corporate Organizational Structure; Identifying Roles in a Consulting Firm Organizational Structure; Summary; Exam Essentials; Review Questions; Chapter 2 Governance.
505 8 _aStrategy Planning for Organizational ControlOverview of the IT Steering Committee; Using the Balanced Scorecard; IT Subset of the BSC; Decoding the IT Strategy; Specifying a Policy; Project Management; Implementation Planning of the IT Strategy; Using COBIT; Identifying Sourcing Locations; Conducting an Executive Performance Review; Understanding the Auditor's Interest in the Strategy; Overview of Tactical Management; Planning and Performance; Management Control Methods; Risk Management; Implementing Standards; Human Resources; System Life-Cycle Management; Continuity Planning; Insurance.
505 8 _aOverview of Business Process ReengineeringWhy Use Business Process Reengineering; BPR Methodology; Genius or Insanity?; Goal of BPR; Guiding Principles for BPR; Knowledge Requirements for BPR; BPR Techniques; BPR Application Steps; Role of IS in BPR; Business Process Documentation; BPR Data Management Techniques; Benchmarking as a BPR Tool; Using a Business Impact Analysis; BPR Project Risk Assessment; Practical Application of BPR; Practical Selection Methods for BPR; Troubleshooting BPR Problems; Understanding the Auditor's Interest in Tactical Management; Operations Management.
542 _fCopyright � Sybex
_g2016
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security
_xExaminations
_vStudy guides.
650 0 _aInformation storage and retrieval systems
_xSecurity measures
_xExaminations
_vStudy guides.
650 0 _aComputer networks
_xSecurity measures
_xExaminations
_vStudy guides.
650 0 _aManagement information systems
_xAuditing
_xExaminations
_vStudy guides.
650 6 _aS�ecurit�e informatique
_xExamens
_vGuides de l'�etudiant.
650 6 _aSyst�emes d'information
_xS�ecurit�e
_xMesures
_xExamens
_vGuides de l'�etudiant.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures
_xExamens
_vGuides de l'�etudiant.
650 7 _aCOMPUTERS
_xSecurity
_xOnline Safety & Privacy.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures
_xExaminations
_2fast
650 7 _aComputer security
_xExaminations
_2fast
655 7 _aexamination study guides.
_2aat
655 7 _aStudy guides
_2fast
655 7 _aStudy guides.
_2lcgft
655 7 _aGuides de l'�etudiant.
_2rvmgf
776 0 8 _iPrint version:
_aCannon, David L., 1962-
_tCISA.
_bFourth edition
_z9781119056249
830 0 _aOnline access with DDA: Askews (Maths)
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119419211
938 _aAskews and Holts Library Services
_bASKH
_nAH28825506
938 _aAskews and Holts Library Services
_bASKH
_nAH28825745
938 _aEBL - Ebook Library
_bEBLB
_nEBL4415503
938 _aEBSCOhost
_bEBSC
_n1179472
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis30000773
938 _aYBP Library Services
_bYANK
_n12858100
938 _aYBP Library Services
_bYANK
_n14419822
994 _a92
_bINLUM
999 _c12333
_d12333