Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
IT auditing : using controls to protect information assets
by
Kegerreis, Mike, author
, Schiller, Mike, author
, Davis, Chris (Christopher Michael), author
, Wrozek, Brian, author
in
Electronic data processing Auditing.
/ Computer networks Security measures.
/ Computer security.
/ Information audits.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
IT auditing : using controls to protect information assets
by
Kegerreis, Mike, author
, Schiller, Mike, author
, Davis, Chris (Christopher Michael), author
, Wrozek, Brian, author
in
Electronic data processing Auditing.
/ Computer networks Security measures.
/ Computer security.
/ Information audits.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
IT auditing : using controls to protect information assets
by
Kegerreis, Mike, author
, Schiller, Mike, author
, Davis, Chris (Christopher Michael), author
, Wrozek, Brian, author
in
Electronic data processing Auditing.
/ Computer networks Security measures.
/ Computer security.
/ Information audits.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
IT auditing : using controls to protect information assets
Book
IT auditing : using controls to protect information assets
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"Explains, step by step, how to implement a successful, enterprise-wide IT audit program...This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered.\"--Publisher's description.
Publisher
McGraw-Hill Education
Subject
ISBN
9781260453225, 1260453227
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.A93 K44 2020 | 1 | BOOK | AUTOSTORE |
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.