Description

Book Synopsis
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit.

Table of Contents
Preface.

Acknowledgments.

PART ONE: CORE CONCEPTS.

Chapter 1. Basics of Computing Systems.

Chapter 2. Identifying Computer Systems.

PART TWO: STANDARD INFORMATION SYSTEMS AUDIT APPROACH.

Chapter 3. Information Systems Audit Program.

Chapter 4. Information Systems Security Policies, Standards, and/or Guidelines.

Chapter 5. Auditing Service Organization Applications.

Chapter 6. Assessing the Financial Stability of Vendor Organizations, Examining Vendor Organization Contracts, and Examining Accounting Treatment of Computer Equipment and Software.

Chapter 7. Physical Security.

Chapter 8. Logical Security.

Chapter 9. Information Systems Operations.

PART THREE: CONTEMPORARY INFORMATION SYSTEMS AUDITING CONCEPTS.

Chapter 10. Control Self-Assessment and an Application in an Information Systems Environment.

Chapter 11. Encryption and Cryptography.

Chapter 12. Computer Forensics.

Chapter 13. Other Contemporary Information Systems Auditing Challenges.

Chapter 14. Humanistic Aspects of Information Systems Auditing.

Chapter 15. Information Systems Project Management Audits.

Chapter 16. Conclusion.

Appendix A: Professional Auditing Associations and Other Organizations Related to Information Systems Auditing and Computer Security.

Appendix B: Common Criteria for Information Technology Security Evaluation.

Appendix C: The International Organization for Standardization: Seven-Layer Open Systems Interconnection Reference Model.

Selected References.

Glossary.

Index.

Information Systems 2E wURL A Comprehensive

Product form

£112.50

Includes FREE delivery

RRP £125.00 – you save £12.50 (10%)

Order before 4pm tomorrow for delivery by Wed 21 Jan 2026.

A Hardback by Jack J. Champlain

15 in stock


    View other formats and editions of Information Systems 2E wURL A Comprehensive by Jack J. Champlain

    Publisher: John Wiley & Sons Inc
    Publication Date: 25/03/2003
    ISBN13: 9780471281177, 978-0471281177
    ISBN10: 0471281174

    Description

    Book Synopsis
    Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit.

    Table of Contents
    Preface.

    Acknowledgments.

    PART ONE: CORE CONCEPTS.

    Chapter 1. Basics of Computing Systems.

    Chapter 2. Identifying Computer Systems.

    PART TWO: STANDARD INFORMATION SYSTEMS AUDIT APPROACH.

    Chapter 3. Information Systems Audit Program.

    Chapter 4. Information Systems Security Policies, Standards, and/or Guidelines.

    Chapter 5. Auditing Service Organization Applications.

    Chapter 6. Assessing the Financial Stability of Vendor Organizations, Examining Vendor Organization Contracts, and Examining Accounting Treatment of Computer Equipment and Software.

    Chapter 7. Physical Security.

    Chapter 8. Logical Security.

    Chapter 9. Information Systems Operations.

    PART THREE: CONTEMPORARY INFORMATION SYSTEMS AUDITING CONCEPTS.

    Chapter 10. Control Self-Assessment and an Application in an Information Systems Environment.

    Chapter 11. Encryption and Cryptography.

    Chapter 12. Computer Forensics.

    Chapter 13. Other Contemporary Information Systems Auditing Challenges.

    Chapter 14. Humanistic Aspects of Information Systems Auditing.

    Chapter 15. Information Systems Project Management Audits.

    Chapter 16. Conclusion.

    Appendix A: Professional Auditing Associations and Other Organizations Related to Information Systems Auditing and Computer Security.

    Appendix B: Common Criteria for Information Technology Security Evaluation.

    Appendix C: The International Organization for Standardization: Seven-Layer Open Systems Interconnection Reference Model.

    Selected References.

    Glossary.

    Index.

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account