文档介绍:IT Auditing, Second Edition Reviews
“This guidance will enable an auditor to properly determine the scope of the control
environment and residual risks. The authors present the information in an easy-to-
consume prehensive format that generates both thought and action.”
—Kurt Roemer, Chief Security Strategist
Citrix
“IT Auditing, Second Edition is a must-have resource for auditors in today’plex
computing world. This book is filled with the essential how-to guidance necessary to
effectively audit today’s technology.”
—Shawn Irving, Sr Manager IT Security Standards & Compliance
Southwest Airlines – Information Technology
“Traditional IT audits have focused on enterprise systems using enterprise-based tools. As
enterprise systems move to outsourced and cloud-based services, new cloud-based tools
are needed to audit these distributed systems. Either enterprise vendors will rewrite their
tools to address cloud-based systems or new and existing cloud-based tools will be used
to assist auditors with these distributed systems. The book gives good insights on how to
address these new challenges and provides mendations on auditing cloud-based
services.”
—Matthew R. Alderman, CISSP, Director, Product Management
Qualys, Inc.
“An essential contribution to the security of Information Systems in the dawn of a
wide-spread puting environment. This book is crucial reading for anyone
responsible for auditing information systems.”
—Peter Bassill CISSP, CITP
ISACA Security Advisory Group and CISO of Gala Coral Group
“We used the first edition in the graduate IT Audit and Risk Management class during
the past year, and it was an outstanding resource for students with diverse backgrounds.
I am excited about the second edition as it covers new areas like puting and
virtualized environments, along with updates to reflect emerging issues. The authors have
done a great job at capturing the essence of IT risk management for individuals with