|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1123174430 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
191015s2020 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d YDX
|d COO
|d N$T
|d OCLCO
|d OCLCQ
|d OCLCO
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1137805808
|a 1273726743
|a 1351840235
|
020 |
|
|
|a 9781260453232
|
020 |
|
|
|a 1260453235
|
020 |
|
|
|z 9781260453225
|
020 |
|
|
|z 1260453227
|
029 |
1 |
|
|a AU@
|b 000071520511
|
035 |
|
|
|a (OCoLC)1123174430
|z (OCoLC)1137805808
|z (OCoLC)1273726743
|z (OCoLC)1351840235
|
037 |
|
|
|a CL0501000076
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A93
|
082 |
0 |
4 |
|a 657/.458
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kegerreis, Mike,
|e author.
|
245 |
1 |
0 |
|a IT auditing :
|b using controls to protect information assets /
|c Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek.
|
246 |
3 |
|
|a Information technology auditing
|
250 |
|
|
|a Third edition.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill,
|c [2020]
|
264 |
|
4 |
|c ©2020
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed October 14, 2019).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program. --
|c Edited summary from book.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Electronic data processing
|x Auditing.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Electronic data processing
|x Auditing
|2 fast
|
650 |
|
7 |
|a Information technology
|x Management
|2 fast
|
700 |
1 |
|
|a Davis, Chris
|q (Christopher Michael),
|e author.
|
700 |
1 |
|
|a Schiller, Mike,
|e author.
|
700 |
1 |
|
|a Wrozek, Brian,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781260453232/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2686215
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16842725
|
994 |
|
|
|a 92
|b IZTAP
|