Security, Audit and Control Features SAP ERP, 4th Edition

Security, Audit and Control Features SAP ERP, 4th Edition
Title Security, Audit and Control Features SAP ERP, 4th Edition PDF eBook
Author Isaca
Publisher
Total Pages
Release 2015
Genre
ISBN 9781604205800

Download Security, Audit and Control Features SAP ERP, 4th Edition Book in PDF, Epub and Kindle

Security, Audit and Control Features

Security, Audit and Control Features
Title Security, Audit and Control Features PDF eBook
Author ISACA
Publisher ISACA
Total Pages 43
Release 2009
Genre Computers
ISBN 1604201185

Download Security, Audit and Control Features Book in PDF, Epub and Kindle

Security, Audit and Control Features PeopleSoft

Security, Audit and Control Features PeopleSoft
Title Security, Audit and Control Features PeopleSoft PDF eBook
Author IT Governance Institute
Publisher ISACA
Total Pages 284
Release 2006
Genre Business
ISBN 1933284463

Download Security, Audit and Control Features PeopleSoft Book in PDF, Epub and Kindle

Linux

Linux
Title Linux PDF eBook
Author K. K. Mookhey
Publisher ISACA
Total Pages 168
Release 2005
Genre Computer security
ISBN 1893209784

Download Linux Book in PDF, Epub and Kindle

This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.

IT Audit, Control, and Security

IT Audit, Control, and Security
Title IT Audit, Control, and Security PDF eBook
Author Robert R. Moeller
Publisher John Wiley & Sons
Total Pages 696
Release 2010-10-12
Genre Business & Economics
ISBN 0470877685

Download IT Audit, Control, and Security Book in PDF, Epub and Kindle

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Security, Audit and Control Features

Security, Audit and Control Features
Title Security, Audit and Control Features PDF eBook
Author Information Systems Audit and Control Association
Publisher Isaca
Total Pages 461
Release 2009
Genre Auditing
ISBN 9781604201154

Download Security, Audit and Control Features Book in PDF, Epub and Kindle

OS/390-z/OS Security, Audit and Control Features

OS/390-z/OS Security, Audit and Control Features
Title OS/390-z/OS Security, Audit and Control Features PDF eBook
Author
Publisher It Governance Institute
Total Pages 543
Release 2004
Genre Computer networks
ISBN 9781893209398

Download OS/390-z/OS Security, Audit and Control Features Book in PDF, Epub and Kindle

The IBM large-scale mainframe system software, although one of the most stable and certainly the most long-lived of such systems, undergoes constant change and continuous updates. It was known as MVS for many years, until recently it was OS/390 and now is z/OS. The need for security and audit professionals to update their knowledge to correspond to the current hardware and software levels is more pronounced than ever before. This publication deals with those concepts, components and functions of OS/390 and z/OS that are deemed to be of primary relevance in terms of the security and audit issues. The publication provides a detailed focus on issues such as: * Business drivers and technology considerations * System initialization, security functions, audit tools and methods * Detailed descriptions of new components and functions * Recently added functions, mainly those that permit the use of the Internet, and UNIX functions in the OS/390 environment * Detailed table listings and suggested approaches for testing * The suggested framework for properly controlled and successful implementation * An Internal control questionnaire and detailed audit program. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.