Information technology auditing: an evolving agenda
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York
Springer
2005
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 189 - 208 |
Beschreibung: | XIV, 237 S. 24 cm |
ISBN: | 3540221557 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021806869 | ||
003 | DE-604 | ||
005 | 20110126 | ||
007 | t | ||
008 | 061113s2005 gw |||| 00||| eng d | ||
015 | |a 04,N30,0075 |2 dnb | ||
015 | |a 06,A29,1013 |2 dnb | ||
016 | 7 | |a 971634440 |2 DE-101 | |
020 | |a 3540221557 |c Pp. : EUR 80.20 (freier Pr.), sfr 135.50 (freier Pr.) |9 3-540-22155-7 | ||
024 | 3 | |a 9783540221555 | |
028 | 5 | 2 | |a 11012511 |
035 | |a (OCoLC)59876621 | ||
035 | |a (DE-599)BVBBV021806869 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-739 |a DE-91G |a DE-11 |a DE-525 |a DE-1050 | ||
050 | 0 | |a HD30.2 | |
082 | 0 | |a 658.4'038071 |2 22 | |
082 | 0 | |a 657.450285 |2 22 | |
084 | |a QQ 537 |0 (DE-625)141982: |2 rvk | ||
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
084 | |a 650 |2 sdnb | ||
084 | |a DAT 060f |2 stub | ||
100 | 1 | |a Pathak, Jagdish |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information technology auditing |b an evolving agenda |c Jagdish Pathak |
264 | 1 | |a Berlin ; Heidelberg ; New York |b Springer |c 2005 | |
300 | |a XIV, 237 S. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverz. S. 189 - 208 | ||
650 | 7 | |a Auditing |2 gtt | |
650 | 7 | |a ICT |2 gtt | |
650 | 7 | |a Informatiesystemen |2 gtt | |
650 | 4 | |a Information technology |x Management |x Auditing | |
650 | 4 | |a Management information systems |x Auditing | |
650 | 0 | 7 | |a EDV-Systemprüfung |0 (DE-588)4200282-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a EDV-Systemprüfung |0 (DE-588)4200282-5 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015019224&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015019224 |
Datensatz im Suchindex
_version_ | 1804135725373849600 |
---|---|
adam_text | TABLE OF CONTENTS
1 IT AUDITING: AN OVERVIEW AND APPROACH 1
1.1 EVOLUTION IN MANAGEMENTS PERCEPTIONS 1
1.2 EVOLUTION IN INFORMATION PROCESSING CAPABILITIES 2
1.3 EXPOSURE TO LOSS 3
1.4 OBJECTIVES OF IT AUDITING 5
1.5 INTERNAL CONTROLS AND IT AUDIT 5
1.5.1 VARIOUS INTERNAL CONTROLS 7
1.6 GROWTH AND GENESIS OF IT AUDITING 7
1.7 IT AUDIT APPROACH 9
1.7.1 NATURE OF IT CONTROLS 9
1.7.2 CONTROLS AND LOSS 11
1.7.3 INTERNAL CONTROLS AND AUDITING APPROACH 12
1.8 STEPS IN AN IT AUDIT 12
1.9 AUDIT DECISIONS 15
2 AUDITING AND COMPLEX BUSINESS INFORMATION SYSTEMS 21
2.1 COMPLEX INTEGRATED ACCOUNTING SYSTEMS 22
2.2 DISTRIBUTED DATA AND ITS EFFECTS ON ORGANISATIONS 24
2.2.1 NETWORKS 25
2.2.2 PORTABILITY AND SYSTEMS 31
2.2.3 INTEGRATION OF APPLICATIONS 32
2.3 PRODUCTIVITY ASPECT OF THE TECHNOLOGY 32
2.4 BUSINESS PROCESS RE-ENGINEERING 33
2.5 INTELLIGENT SYSTEMS 34
2.6 AUDITORS AND CHANGING TECHNOLOGY 36
2.7 STRATEGIC USE OF TECHNOLOGY AND AUDIT IMPLICATIONS 37
2.8 INTERNAL CONTROLS AND AUDITING 40
3 GENERATION-X TECHNOLOGIES AND IT AUDITING 45
3.1 GENERATION-X ENTERPRISE TECHNOLOGIES 46
3.2 INFORMATION SYSTEMS INTEGRATION: A CHALLENGE 48
3.3 ASSURED INFORMATION EMANATES FROM ASSURED SYSTEMS 51
3.4 INFORMATION ASSURANCE: A FUNCTION OF STRATEGIC IMPORTANCE 53
3.5 VARIOUS INFORMATION ASSURANCE AND CONTROL MEASURES 56
3.5.1 WEB-LEVEL ASSURANCE MEASURES 57
3.6 CONTROL OBJECTIVES AND SYSTEM ASSURANCE 58
VIII TABLE OF CONTENTS
3.6.1 BRITISH STANDARDS: BS7799 AND BS 7799-2:2002 60
3.6.2 SYSTEM SECURITY ENGINEERING CAPABILITY MATURITY MODEL:
SSE-CMM .7. 60
4 COMPLEX INFORMATION SYSTEMS, AUDITING STANDARDS AND IT AUDITORS 63
4.1 THE APPROACH AND OBJECTIVES 63
4.1.1 THE SCENARIO 65
4.2 IMPACT OF TECHNOLOGY COMPLEXITY ON THE AUDITOR 65
4.2.1 COMPLEX INFORMATION TECHNOLOGIES AND AUDIT RISKS 67
4.2.2 SAS-94 AND ITS EFFECT
ON
THE AUDIT PROCESS 70
5 ERP AND INFORMATION INTEGRATION ISSUES: PERSPECTIVE FOR AUDITORS 75
5.1 WHAT IS ENTERPRISE RESOURCE PLANNING? 77
5.2 IMPLEMENTATION CYCLE 79
5.3 CONCEPTUAL MODELS 80
5.3.1 SUCCESSES AND DISASTERS 81
5.4 TYPES OF IMPLEMENTATION 82
5.5 SOCIAL INTEGRATION 83
5.6 RESISTANCE IN SOCIAL INTEGRATION 84
5.7 PROCESS INTEGRATION 84
5.7.1 COMMUNICATIONS IN PROCESS INTEGRATION 85
5.7.2 ALIGNMENT OF CULTURE IN PROCESS INTEGRATION 86
5.7.3 KNOWLEDGE INTEGRATION 86
5.7.4 WORKFLOW INTEGRATION 89
5.7.5 BEST PRACTICES IN FUNCTIONAL INTEGRATION 90
5.7.6 VIRTUAL INTEGRATION 91
5.8 AUDITOR AND ERP 92
5.8.1 ERP INTERNAL CONTROL PROCEDURES 92
6 TECHNOLOGY , AUDITING AND CYBER-COMMERCE 95
6.1 TECHNOLOGY AND AUDITING 96
6.2 RISK UNDERSTANDING IN E-COMMERCE FOR IT AUDITOR 99
6.3 INFORMATION AT RISK 101
6.4 CONTROLS AND AUDIT EVIDENCES 105
7 IT AUDITING AND SECURITY OF INFORMATION
SYSTEMS
107
7.1 INFORMATION SECURITY 108
7.1.1 COMPUTER ASSETS 109
7.2 SECURITY CONTROLS 110
7.3 SECURITY EVALUATION AND CERTIFICATION CRITERIA 112
7.3.1 NETWORKS SECURITY 113
7.3.2 OSI ARCHITECTURE 115
7.3.3 SECURITY MECHANISMS 118
7.3.4 INTEGRITY 120
7.3.5 SECURITY MECHANISMS LOCATION 122
7.4 FUTURE TRENDS 123
TABLE OF CONTENTS IX
7.5 EXEMPLARY CASE LAWS RELATED TO SECURITY NEEDS AND BREACHES IN USA
124
7.5.1 CASE LAWS RELATED TO DATA PRESERVATION 124
7.5.2 CASE LAWS PERTAINING TO THE SCOPE OF DISCOVERY 125
7.5.3 CASE LAWS RELATED TO THE RECORDS MANAGEMENT 131
7.5.4 CASE LAWS PERTAINING TO THE USE OF EXPERTS 133
7.5.5 CASE LAWS RELATED TO THE COSTS AND ALLOCATION 134
7.5.6 CASE LAWS RELATED TO THE SPOLIATION AND SANCTIONS 136
7.5.7 CASE LAWS PERTAINING TO INADVERTENT DISCLOSURE 139
7.5.8 CASE LAWS RELATED TO THE METHOD OF LITIGATION 140
7.5.9 CASE LAWS RELATED TO CRIMINAL ISSUES OF SECURITY 142
7.5.10 CASE LAWS RELATED TO THE RELIABILITY 142
7.5.11 E-SIGN STATUTE AND CASE LAWS 143
7.5.12 CASE LAWS ON PRIVACY 144
7.6 KIND OF AUDITS CALLED SECURITY AUDITS 145
7.6.1 INTERNET/PERIMETER AUDIT 145
7.6.2 WEBSITE AUDIT 145
7.6.3 PENETRATION AUDIT (ETHICAL HACKING) 145
7.6.4 WIRELESS AUDIT 146
7.6.5 NETWORK AUDIT 146
7.6.6 SECURITY POLICIES AND PROCEDURES AUDIT 146
7.6.7 FACILITIES AUDIT (PHYSICAL) 146
7.6.8 BUSINESS CONTINUITY PLAN (BCP) AND DISASTER RECOVERY (DR) 147
7.6.9 REGULATORY COMPLIANCE AUDITS 147
7.7 HOW CAN SECURITY AUDIT HELP THE ENTERPRISES? 148
7.7.1 PROTECTING THE PHYSICAL SAFETY OF YOUR EMPLOYEES, VENDORS,
AND VISITORS 148
8 INFORMATION TECHNOLOGY GOVERNANCE AND COBIT 151
8.1 WHY DO WE NEED IT GOVERNANCE? 152
8.2 INTRODUCTION TO COBIT 153
8.2.1 COBIT AND THE REALITY 154
9 DATABASE MANAGEMENT SYSTEMS AND AUDITING 157
9.1 CONCEPTS OF DATABASE TECHNOLOGY FOR AUDITORS 157
9.1.1 DATA INDEPENDENCE 158
9.1.2 DATABASE MANAGEMENT SYSTEMS AND ITS FUNCTIONS 158
9.1.3 RELATIONAL DATABASE MANAGEMENT SYSTEMS (RDMS) 162
9.1.4 DATABASE SECURITY 167
9.1.5 DISTRIBUTED DATABASE SYSTEMS 174
9.1.6 OBJECT DATA MANAGEMENT SYSTEMS 175
9.1.7 RELATION AND OBJECT: A COMPARISON 175
9.1.8 DATA WAREHOUSES 177
9.2 OPERATIONAL SYSTEMS COMPARED TO INFORMATIONAL SYSTEMS 178
TABLE OF CONTENTS
10 EAI: AUDITORS SHOULD KNOW POTENTIAL RISKS TO ENTERPRISE 181
10.1 THE PROMISE OF EAI 184
10.2 IMPROVEMENT IN PRODUCTIVITY 184
10.2.1 DATA FLOW STREAMLINED 185
10.3 EAI REACHES BEYOND YOUR BORDERS 185
10.3.1 LOWERED COSTS 186
BIBLIOGRAPHY AND FURTHER REFERENCES 189
GLOSSARY OF IT AUDITING TERMS 209
|
adam_txt |
TABLE OF CONTENTS
1 IT AUDITING: AN OVERVIEW AND APPROACH 1
1.1 EVOLUTION IN MANAGEMENTS' PERCEPTIONS 1
1.2 EVOLUTION IN INFORMATION PROCESSING CAPABILITIES 2
1.3 EXPOSURE TO LOSS 3
1.4 OBJECTIVES OF IT AUDITING 5
1.5 INTERNAL CONTROLS AND IT AUDIT 5
1.5.1 VARIOUS INTERNAL CONTROLS 7
1.6 GROWTH AND GENESIS OF IT AUDITING 7
1.7 IT AUDIT APPROACH 9
1.7.1 NATURE OF IT CONTROLS 9
1.7.2 CONTROLS AND LOSS 11
1.7.3 INTERNAL CONTROLS AND AUDITING APPROACH 12
1.8 STEPS IN AN IT AUDIT 12
1.9 AUDIT DECISIONS 15
2 AUDITING AND COMPLEX BUSINESS INFORMATION SYSTEMS 21
2.1 COMPLEX INTEGRATED ACCOUNTING SYSTEMS 22
2.2 DISTRIBUTED DATA AND ITS EFFECTS ON ORGANISATIONS 24
2.2.1 NETWORKS 25
2.2.2 PORTABILITY AND SYSTEMS 31
2.2.3 INTEGRATION OF APPLICATIONS 32
2.3 PRODUCTIVITY ASPECT OF THE TECHNOLOGY 32
2.4 BUSINESS PROCESS RE-ENGINEERING 33
2.5 INTELLIGENT SYSTEMS 34
2.6 AUDITORS AND CHANGING TECHNOLOGY 36
2.7 STRATEGIC USE OF TECHNOLOGY AND AUDIT IMPLICATIONS 37
2.8 INTERNAL CONTROLS AND AUDITING 40
3 GENERATION-X TECHNOLOGIES AND IT AUDITING 45
3.1 GENERATION-X ENTERPRISE TECHNOLOGIES 46
3.2 INFORMATION SYSTEMS INTEGRATION: A CHALLENGE 48
3.3 ASSURED INFORMATION EMANATES FROM ASSURED SYSTEMS 51
3.4 INFORMATION ASSURANCE: A FUNCTION OF STRATEGIC IMPORTANCE 53
3.5 VARIOUS INFORMATION ASSURANCE AND CONTROL MEASURES 56
3.5.1 WEB-LEVEL ASSURANCE MEASURES 57
3.6 CONTROL OBJECTIVES AND SYSTEM ASSURANCE 58
VIII TABLE OF CONTENTS
3.6.1 BRITISH STANDARDS: BS7799 AND BS 7799-2:2002 60
3.6.2 SYSTEM SECURITY ENGINEERING CAPABILITY MATURITY MODEL:
SSE-CMM .7. 60
4 COMPLEX INFORMATION SYSTEMS, AUDITING STANDARDS AND IT AUDITORS 63
4.1 THE APPROACH AND OBJECTIVES 63
4.1.1 THE SCENARIO 65
4.2 IMPACT OF TECHNOLOGY COMPLEXITY ON THE AUDITOR 65
4.2.1 COMPLEX INFORMATION TECHNOLOGIES AND AUDIT RISKS 67
4.2.2 SAS-94 AND ITS EFFECT
ON
THE AUDIT PROCESS 70
5 ERP AND INFORMATION INTEGRATION ISSUES: PERSPECTIVE FOR AUDITORS 75
5.1 WHAT IS ENTERPRISE RESOURCE PLANNING? 77
5.2 IMPLEMENTATION CYCLE 79
5.3 CONCEPTUAL MODELS 80
5.3.1 SUCCESSES AND DISASTERS 81
5.4 TYPES OF IMPLEMENTATION 82
5.5 SOCIAL INTEGRATION 83
5.6 RESISTANCE IN SOCIAL INTEGRATION 84
5.7 PROCESS INTEGRATION 84
5.7.1 COMMUNICATIONS IN PROCESS INTEGRATION 85
5.7.2 ALIGNMENT OF CULTURE IN PROCESS INTEGRATION 86
5.7.3 KNOWLEDGE INTEGRATION 86
5.7.4 WORKFLOW INTEGRATION 89
5.7.5 BEST PRACTICES IN FUNCTIONAL INTEGRATION 90
5.7.6 VIRTUAL INTEGRATION 91
5.8 AUDITOR AND ERP 92
5.8.1 ERP INTERNAL CONTROL PROCEDURES 92
6 TECHNOLOGY', AUDITING AND CYBER-COMMERCE 95
6.1 TECHNOLOGY AND AUDITING 96
6.2 RISK UNDERSTANDING IN E-COMMERCE FOR IT AUDITOR 99
6.3 INFORMATION AT RISK 101
6.4 CONTROLS AND AUDIT EVIDENCES 105
7 IT AUDITING AND SECURITY OF INFORMATION
SYSTEMS
107
7.1 INFORMATION SECURITY 108
7.1.1 COMPUTER ASSETS 109
7.2 SECURITY CONTROLS 110
7.3 SECURITY EVALUATION AND CERTIFICATION CRITERIA 112
7.3.1 NETWORKS SECURITY 113
7.3.2 OSI ARCHITECTURE 115
7.3.3 SECURITY MECHANISMS 118
7.3.4 INTEGRITY 120
7.3.5 SECURITY MECHANISMS LOCATION 122
7.4 FUTURE TRENDS 123
TABLE OF CONTENTS IX
7.5 EXEMPLARY CASE LAWS RELATED TO SECURITY NEEDS AND BREACHES IN USA
124
7.5.1 CASE LAWS RELATED TO DATA PRESERVATION 124
7.5.2 CASE LAWS PERTAINING TO THE SCOPE OF DISCOVERY 125
7.5.3 CASE LAWS RELATED TO THE RECORDS MANAGEMENT 131
7.5.4 CASE LAWS PERTAINING TO THE USE OF EXPERTS 133
7.5.5 CASE LAWS RELATED TO THE COSTS AND ALLOCATION 134
7.5.6 CASE LAWS RELATED TO THE SPOLIATION AND SANCTIONS 136
7.5.7 CASE LAWS PERTAINING TO INADVERTENT DISCLOSURE 139
7.5.8 CASE LAWS RELATED TO THE METHOD OF LITIGATION 140
7.5.9 CASE LAWS RELATED TO CRIMINAL ISSUES OF SECURITY 142
7.5.10 CASE LAWS RELATED TO THE RELIABILITY 142
7.5.11 E-SIGN STATUTE AND CASE LAWS 143
7.5.12 CASE LAWS ON PRIVACY 144
7.6 KIND OF AUDITS CALLED SECURITY AUDITS 145
7.6.1 INTERNET/PERIMETER AUDIT 145
7.6.2 WEBSITE AUDIT 145
7.6.3 PENETRATION AUDIT (ETHICAL HACKING) 145
7.6.4 WIRELESS AUDIT 146
7.6.5 NETWORK AUDIT 146
7.6.6 SECURITY POLICIES AND PROCEDURES AUDIT 146
7.6.7 FACILITIES AUDIT (PHYSICAL) 146
7.6.8 BUSINESS CONTINUITY PLAN (BCP) AND DISASTER RECOVERY (DR) 147
7.6.9 REGULATORY COMPLIANCE AUDITS 147
7.7 HOW CAN SECURITY AUDIT HELP THE ENTERPRISES? 148
7.7.1 PROTECTING THE PHYSICAL SAFETY OF YOUR EMPLOYEES, VENDORS,
AND VISITORS 148
8 INFORMATION TECHNOLOGY GOVERNANCE AND COBIT 151
8.1 WHY DO WE NEED IT GOVERNANCE? 152
8.2 INTRODUCTION TO COBIT 153
8.2.1 COBIT AND THE REALITY 154
9 DATABASE MANAGEMENT SYSTEMS AND AUDITING 157
9.1 CONCEPTS OF DATABASE TECHNOLOGY FOR AUDITORS 157
9.1.1 DATA INDEPENDENCE 158
9.1.2 DATABASE MANAGEMENT SYSTEMS AND ITS FUNCTIONS 158
9.1.3 RELATIONAL DATABASE MANAGEMENT SYSTEMS (RDMS) 162
9.1.4 DATABASE SECURITY 167
9.1.5 DISTRIBUTED DATABASE SYSTEMS 174
9.1.6 OBJECT DATA MANAGEMENT SYSTEMS 175
9.1.7 RELATION AND OBJECT: A COMPARISON 175
9.1.8 DATA WAREHOUSES 177
9.2 OPERATIONAL SYSTEMS COMPARED TO INFORMATIONAL SYSTEMS 178
TABLE OF CONTENTS
10 EAI: AUDITORS SHOULD KNOW POTENTIAL RISKS TO ENTERPRISE 181
10.1 THE PROMISE OF EAI 184
10.2 IMPROVEMENT IN PRODUCTIVITY 184
10.2.1 DATA FLOW STREAMLINED 185
10.3 EAI REACHES BEYOND YOUR BORDERS 185
10.3.1 LOWERED COSTS 186
BIBLIOGRAPHY AND FURTHER REFERENCES 189
GLOSSARY OF IT AUDITING TERMS 209 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Pathak, Jagdish |
author_facet | Pathak, Jagdish |
author_role | aut |
author_sort | Pathak, Jagdish |
author_variant | j p jp |
building | Verbundindex |
bvnumber | BV021806869 |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.2 |
callnumber-search | HD30.2 |
callnumber-sort | HD 230.2 |
callnumber-subject | HD - Industries, Land Use, Labor |
classification_rvk | QQ 537 SR 860 |
classification_tum | DAT 060f |
ctrlnum | (OCoLC)59876621 (DE-599)BVBBV021806869 |
dewey-full | 658.4'038071 657.450285 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management 657 - Accounting |
dewey-raw | 658.4'038071 657.450285 |
dewey-search | 658.4'038071 657.450285 |
dewey-sort | 3658.4 538071 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01887nam a2200529 c 4500</leader><controlfield tag="001">BV021806869</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110126 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">061113s2005 gw |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">04,N30,0075</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,A29,1013</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">971634440</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540221557</subfield><subfield code="c">Pp. : EUR 80.20 (freier Pr.), sfr 135.50 (freier Pr.)</subfield><subfield code="9">3-540-22155-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540221555</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11012511</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)59876621</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021806869</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-525</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD30.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4'038071</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">657.450285</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QQ 537</subfield><subfield code="0">(DE-625)141982:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 060f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pathak, Jagdish</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology auditing</subfield><subfield code="b">an evolving agenda</subfield><subfield code="c">Jagdish Pathak</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York</subfield><subfield code="b">Springer</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 237 S.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 189 - 208</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Auditing</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">ICT</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatiesystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">EDV-Systemprüfung</subfield><subfield code="0">(DE-588)4200282-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">EDV-Systemprüfung</subfield><subfield code="0">(DE-588)4200282-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015019224&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015019224</subfield></datafield></record></collection> |
id | DE-604.BV021806869 |
illustrated | Not Illustrated |
index_date | 2024-07-02T15:49:31Z |
indexdate | 2024-07-09T20:45:04Z |
institution | BVB |
isbn | 3540221557 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015019224 |
oclc_num | 59876621 |
open_access_boolean | |
owner | DE-739 DE-91G DE-BY-TUM DE-11 DE-525 DE-1050 |
owner_facet | DE-739 DE-91G DE-BY-TUM DE-11 DE-525 DE-1050 |
physical | XIV, 237 S. 24 cm |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Springer |
record_format | marc |
spelling | Pathak, Jagdish Verfasser aut Information technology auditing an evolving agenda Jagdish Pathak Berlin ; Heidelberg ; New York Springer 2005 XIV, 237 S. 24 cm txt rdacontent n rdamedia nc rdacarrier Literaturverz. S. 189 - 208 Auditing gtt ICT gtt Informatiesystemen gtt Information technology Management Auditing Management information systems Auditing EDV-Systemprüfung (DE-588)4200282-5 gnd rswk-swf EDV-Systemprüfung (DE-588)4200282-5 s DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015019224&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Pathak, Jagdish Information technology auditing an evolving agenda Auditing gtt ICT gtt Informatiesystemen gtt Information technology Management Auditing Management information systems Auditing EDV-Systemprüfung (DE-588)4200282-5 gnd |
subject_GND | (DE-588)4200282-5 |
title | Information technology auditing an evolving agenda |
title_auth | Information technology auditing an evolving agenda |
title_exact_search | Information technology auditing an evolving agenda |
title_exact_search_txtP | Information technology auditing an evolving agenda |
title_full | Information technology auditing an evolving agenda Jagdish Pathak |
title_fullStr | Information technology auditing an evolving agenda Jagdish Pathak |
title_full_unstemmed | Information technology auditing an evolving agenda Jagdish Pathak |
title_short | Information technology auditing |
title_sort | information technology auditing an evolving agenda |
title_sub | an evolving agenda |
topic | Auditing gtt ICT gtt Informatiesystemen gtt Information technology Management Auditing Management information systems Auditing EDV-Systemprüfung (DE-588)4200282-5 gnd |
topic_facet | Auditing ICT Informatiesystemen Information technology Management Auditing Management information systems Auditing EDV-Systemprüfung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015019224&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pathakjagdish informationtechnologyauditinganevolvingagenda |