CISA - Certified Information Systems Auditor Study Guide :: Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems.
CISA - Certified Information Systems Auditor Study Guide offers complete, up-to-date coverage of the CISA exam so you can take them with confidence, fully equipped to pass first time. Written in a clear, succinct way with self-assessment questions, exam tips and mock exams with detailed answer expla...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified] :
Packt Publishing,
2020.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | CISA - Certified Information Systems Auditor Study Guide offers complete, up-to-date coverage of the CISA exam so you can take them with confidence, fully equipped to pass first time. Written in a clear, succinct way with self-assessment questions, exam tips and mock exams with detailed answer explanations, this book covers all 5 domains of ... |
Beschreibung: | 1 online resource |
ISBN: | 183898531X 9781838985318 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1191241994 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m d | ||
007 | cr ||||||||||| | ||
008 | 200831s2020 xx o 001 0 eng d | ||
040 | |a YDX |b eng |e rda |c YDX |d EBLCP |d UKMGB |d OCLCF |d UKAHL |d N$T |d UMI |d OL$ |d CPV |d OCLCQ |d OCLCO |d DEGRU | ||
015 | |a GBC0D2436 |2 bnb | ||
016 | 7 | |a 019909324 |2 Uk | |
019 | |a 1193119945 |a 1204240579 | ||
020 | |a 183898531X |q (electronic bk.) | ||
020 | |a 9781838985318 |q (electronic bk.) | ||
020 | |z 9781838989583 (pbk.) | ||
035 | |a (OCoLC)1191241994 |z (OCoLC)1193119945 |z (OCoLC)1204240579 | ||
037 | |a 9781838985318 |b Packt Publishing | ||
050 | 4 | |a TK5105.59 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Doshi, Hemang, |e author. | |
245 | 1 | 0 | |a CISA - Certified Information Systems Auditor Study Guide : |b Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
264 | 1 | |a [Place of publication not identified] : |b Packt Publishing, |c 2020. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Information System Auditing Process -- Chapter 1: Audit Planning -- The content of an audit charter -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Audit planning -- Benefits of audit planning -- Selection criteria -- Reviewing audit planning -- Individual audit assignments -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Business process applications and controls -- E-commerce | |
505 | 8 | |a Electronic Data Interchange (EDI) -- Point of Sale (POS) -- Electronic banking -- Electronic funds transfer (EFT) -- Image processing -- Artificial intelligence and expert systems -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of controls -- Preventive controls -- Detective controls -- Corrective controls -- Deterrent controls -- The difference between preventive and deterrent controls -- Compensating controls -- Control objectives -- Control measures -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Risk-based audit planning | |
505 | 8 | |a What is risk? -- Understanding vulnerability and threat -- Understanding inherent risk and residual risk -- Advantages of risk-based audit planning -- Audit risk -- Risk-based auditing approach -- Risk assessments -- Risk response methodology -- Top-down and bottom-up approaches to policy development -- The top-down approach -- The bottom-up approach -- The best approach -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of audit and assessment -- Self-evaluation questions -- Summary -- Assessments -- Content of the audit charter -- Audit planning | |
505 | 8 | |a Business process applications and controls -- Types of controls -- Risk-based audit planning -- Types of audit and assessment -- Chapter 2: Audit Execution -- Audit project management -- Audit objectives -- Audit phases -- Fraud, irregularities, and illegal acts -- Key aspects from CISA exam perspective -- Self-assessment questions -- Sampling methodology -- Sampling types -- Sampling risk -- Other sampling terms -- The confidence coefficient -- Level of risk -- Expected error rate -- Tolerable error rate -- Sample mean -- Sample standard deviation -- Compliance versus substantive testing | |
505 | 8 | |a The difference between compliance testing vis-à-vis substantive testing -- Examples of compliance testing and substantive testing -- The relationship between compliance testing and substantive testing -- Key aspects from the CISA exam perspective -- Self-assessment questions -- Audit evidence collection techniques -- Reliability of evidence -- Independence of the evidence provider -- Qualifications of the evidence provider -- Objectivity of the evidence -- Timing of the evidence -- Evidence gathering techniques -- Key aspects from the CISA exam perspective -- Self-assessment questions | |
520 | |a CISA - Certified Information Systems Auditor Study Guide offers complete, up-to-date coverage of the CISA exam so you can take them with confidence, fully equipped to pass first time. Written in a clear, succinct way with self-assessment questions, exam tips and mock exams with detailed answer explanations, this book covers all 5 domains of ... | ||
650 | 0 | |a Computer networks |x Security measures |x Examinations |v Study guides. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Examens |v Guides de l'étudiant. | |
650 | 7 | |a COMPUTERS / Certification Guides / General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |x Examinations |2 fast | |
655 | 7 | |a Study guides |2 fast | |
776 | 0 | 8 | |i Print version: |a Doshi, Hemang |t CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to Help You Audit, Monitor, and Assess Information Systems |d Birmingham : Packt Publishing, Limited,c2020 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2579507 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9781838985318 | ||
938 | |a YBP Library Services |b YANK |n 301459191 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH37700028 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6318338 | ||
938 | |a EBSCOhost |b EBSC |n 2579507 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1191241994 |
---|---|
_version_ | 1816882527691866112 |
adam_text | |
any_adam_object | |
author | Doshi, Hemang |
author_facet | Doshi, Hemang |
author_role | aut |
author_sort | Doshi, Hemang |
author_variant | h d hd |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Information System Auditing Process -- Chapter 1: Audit Planning -- The content of an audit charter -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Audit planning -- Benefits of audit planning -- Selection criteria -- Reviewing audit planning -- Individual audit assignments -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Business process applications and controls -- E-commerce Electronic Data Interchange (EDI) -- Point of Sale (POS) -- Electronic banking -- Electronic funds transfer (EFT) -- Image processing -- Artificial intelligence and expert systems -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of controls -- Preventive controls -- Detective controls -- Corrective controls -- Deterrent controls -- The difference between preventive and deterrent controls -- Compensating controls -- Control objectives -- Control measures -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Risk-based audit planning What is risk? -- Understanding vulnerability and threat -- Understanding inherent risk and residual risk -- Advantages of risk-based audit planning -- Audit risk -- Risk-based auditing approach -- Risk assessments -- Risk response methodology -- Top-down and bottom-up approaches to policy development -- The top-down approach -- The bottom-up approach -- The best approach -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of audit and assessment -- Self-evaluation questions -- Summary -- Assessments -- Content of the audit charter -- Audit planning Business process applications and controls -- Types of controls -- Risk-based audit planning -- Types of audit and assessment -- Chapter 2: Audit Execution -- Audit project management -- Audit objectives -- Audit phases -- Fraud, irregularities, and illegal acts -- Key aspects from CISA exam perspective -- Self-assessment questions -- Sampling methodology -- Sampling types -- Sampling risk -- Other sampling terms -- The confidence coefficient -- Level of risk -- Expected error rate -- Tolerable error rate -- Sample mean -- Sample standard deviation -- Compliance versus substantive testing The difference between compliance testing vis-à-vis substantive testing -- Examples of compliance testing and substantive testing -- The relationship between compliance testing and substantive testing -- Key aspects from the CISA exam perspective -- Self-assessment questions -- Audit evidence collection techniques -- Reliability of evidence -- Independence of the evidence provider -- Qualifications of the evidence provider -- Objectivity of the evidence -- Timing of the evidence -- Evidence gathering techniques -- Key aspects from the CISA exam perspective -- Self-assessment questions |
ctrlnum | (OCoLC)1191241994 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05566cam a2200553 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1191241994</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">200831s2020 xx o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDX</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">YDX</subfield><subfield code="d">EBLCP</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">N$T</subfield><subfield code="d">UMI</subfield><subfield code="d">OL$</subfield><subfield code="d">CPV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEGRU</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC0D2436</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019909324</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1193119945</subfield><subfield code="a">1204240579</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">183898531X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838985318</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838989583 (pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1191241994</subfield><subfield code="z">(OCoLC)1193119945</subfield><subfield code="z">(OCoLC)1204240579</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781838985318</subfield><subfield code="b">Packt Publishing</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Doshi, Hemang,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CISA - Certified Information Systems Auditor Study Guide :</subfield><subfield code="b">Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Information System Auditing Process -- Chapter 1: Audit Planning -- The content of an audit charter -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Audit planning -- Benefits of audit planning -- Selection criteria -- Reviewing audit planning -- Individual audit assignments -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Business process applications and controls -- E-commerce</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Electronic Data Interchange (EDI) -- Point of Sale (POS) -- Electronic banking -- Electronic funds transfer (EFT) -- Image processing -- Artificial intelligence and expert systems -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of controls -- Preventive controls -- Detective controls -- Corrective controls -- Deterrent controls -- The difference between preventive and deterrent controls -- Compensating controls -- Control objectives -- Control measures -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Risk-based audit planning</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">What is risk? -- Understanding vulnerability and threat -- Understanding inherent risk and residual risk -- Advantages of risk-based audit planning -- Audit risk -- Risk-based auditing approach -- Risk assessments -- Risk response methodology -- Top-down and bottom-up approaches to policy development -- The top-down approach -- The bottom-up approach -- The best approach -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of audit and assessment -- Self-evaluation questions -- Summary -- Assessments -- Content of the audit charter -- Audit planning</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Business process applications and controls -- Types of controls -- Risk-based audit planning -- Types of audit and assessment -- Chapter 2: Audit Execution -- Audit project management -- Audit objectives -- Audit phases -- Fraud, irregularities, and illegal acts -- Key aspects from CISA exam perspective -- Self-assessment questions -- Sampling methodology -- Sampling types -- Sampling risk -- Other sampling terms -- The confidence coefficient -- Level of risk -- Expected error rate -- Tolerable error rate -- Sample mean -- Sample standard deviation -- Compliance versus substantive testing</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The difference between compliance testing vis-à-vis substantive testing -- Examples of compliance testing and substantive testing -- The relationship between compliance testing and substantive testing -- Key aspects from the CISA exam perspective -- Self-assessment questions -- Audit evidence collection techniques -- Reliability of evidence -- Independence of the evidence provider -- Qualifications of the evidence provider -- Objectivity of the evidence -- Timing of the evidence -- Evidence gathering techniques -- Key aspects from the CISA exam perspective -- Self-assessment questions</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">CISA - Certified Information Systems Auditor Study Guide offers complete, up-to-date coverage of the CISA exam so you can take them with confidence, fully equipped to pass first time. Written in a clear, succinct way with self-assessment questions, exam tips and mock exams with detailed answer explanations, this book covers all 5 domains of ...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Examinations</subfield><subfield code="v">Study guides.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Examens</subfield><subfield code="v">Guides de l'étudiant.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Certification Guides / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Examinations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Study guides</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Doshi, Hemang</subfield><subfield code="t">CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to Help You Audit, Monitor, and Assess Information Systems</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2020</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2579507</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781838985318</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301459191</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37700028</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6318338</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2579507</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Study guides fast |
genre_facet | Study guides |
id | ZDB-4-EBA-on1191241994 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:02Z |
institution | BVB |
isbn | 183898531X 9781838985318 |
language | English |
oclc_num | 1191241994 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Doshi, Hemang, author. CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. [Place of publication not identified] : Packt Publishing, 2020. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Information System Auditing Process -- Chapter 1: Audit Planning -- The content of an audit charter -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Audit planning -- Benefits of audit planning -- Selection criteria -- Reviewing audit planning -- Individual audit assignments -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Business process applications and controls -- E-commerce Electronic Data Interchange (EDI) -- Point of Sale (POS) -- Electronic banking -- Electronic funds transfer (EFT) -- Image processing -- Artificial intelligence and expert systems -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of controls -- Preventive controls -- Detective controls -- Corrective controls -- Deterrent controls -- The difference between preventive and deterrent controls -- Compensating controls -- Control objectives -- Control measures -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Risk-based audit planning What is risk? -- Understanding vulnerability and threat -- Understanding inherent risk and residual risk -- Advantages of risk-based audit planning -- Audit risk -- Risk-based auditing approach -- Risk assessments -- Risk response methodology -- Top-down and bottom-up approaches to policy development -- The top-down approach -- The bottom-up approach -- The best approach -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of audit and assessment -- Self-evaluation questions -- Summary -- Assessments -- Content of the audit charter -- Audit planning Business process applications and controls -- Types of controls -- Risk-based audit planning -- Types of audit and assessment -- Chapter 2: Audit Execution -- Audit project management -- Audit objectives -- Audit phases -- Fraud, irregularities, and illegal acts -- Key aspects from CISA exam perspective -- Self-assessment questions -- Sampling methodology -- Sampling types -- Sampling risk -- Other sampling terms -- The confidence coefficient -- Level of risk -- Expected error rate -- Tolerable error rate -- Sample mean -- Sample standard deviation -- Compliance versus substantive testing The difference between compliance testing vis-à-vis substantive testing -- Examples of compliance testing and substantive testing -- The relationship between compliance testing and substantive testing -- Key aspects from the CISA exam perspective -- Self-assessment questions -- Audit evidence collection techniques -- Reliability of evidence -- Independence of the evidence provider -- Qualifications of the evidence provider -- Objectivity of the evidence -- Timing of the evidence -- Evidence gathering techniques -- Key aspects from the CISA exam perspective -- Self-assessment questions CISA - Certified Information Systems Auditor Study Guide offers complete, up-to-date coverage of the CISA exam so you can take them with confidence, fully equipped to pass first time. Written in a clear, succinct way with self-assessment questions, exam tips and mock exams with detailed answer explanations, this book covers all 5 domains of ... Computer networks Security measures Examinations Study guides. Réseaux d'ordinateurs Sécurité Mesures Examens Guides de l'étudiant. COMPUTERS / Certification Guides / General. bisacsh Computer networks Security measures Examinations fast Study guides fast Print version: Doshi, Hemang CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to Help You Audit, Monitor, and Assess Information Systems Birmingham : Packt Publishing, Limited,c2020 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2579507 Volltext |
spellingShingle | Doshi, Hemang CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Information System Auditing Process -- Chapter 1: Audit Planning -- The content of an audit charter -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Audit planning -- Benefits of audit planning -- Selection criteria -- Reviewing audit planning -- Individual audit assignments -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Business process applications and controls -- E-commerce Electronic Data Interchange (EDI) -- Point of Sale (POS) -- Electronic banking -- Electronic funds transfer (EFT) -- Image processing -- Artificial intelligence and expert systems -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of controls -- Preventive controls -- Detective controls -- Corrective controls -- Deterrent controls -- The difference between preventive and deterrent controls -- Compensating controls -- Control objectives -- Control measures -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Risk-based audit planning What is risk? -- Understanding vulnerability and threat -- Understanding inherent risk and residual risk -- Advantages of risk-based audit planning -- Audit risk -- Risk-based auditing approach -- Risk assessments -- Risk response methodology -- Top-down and bottom-up approaches to policy development -- The top-down approach -- The bottom-up approach -- The best approach -- Key aspects from CISA exam perspective -- Self-evaluation questions -- Types of audit and assessment -- Self-evaluation questions -- Summary -- Assessments -- Content of the audit charter -- Audit planning Business process applications and controls -- Types of controls -- Risk-based audit planning -- Types of audit and assessment -- Chapter 2: Audit Execution -- Audit project management -- Audit objectives -- Audit phases -- Fraud, irregularities, and illegal acts -- Key aspects from CISA exam perspective -- Self-assessment questions -- Sampling methodology -- Sampling types -- Sampling risk -- Other sampling terms -- The confidence coefficient -- Level of risk -- Expected error rate -- Tolerable error rate -- Sample mean -- Sample standard deviation -- Compliance versus substantive testing The difference between compliance testing vis-à-vis substantive testing -- Examples of compliance testing and substantive testing -- The relationship between compliance testing and substantive testing -- Key aspects from the CISA exam perspective -- Self-assessment questions -- Audit evidence collection techniques -- Reliability of evidence -- Independence of the evidence provider -- Qualifications of the evidence provider -- Objectivity of the evidence -- Timing of the evidence -- Evidence gathering techniques -- Key aspects from the CISA exam perspective -- Self-assessment questions Computer networks Security measures Examinations Study guides. Réseaux d'ordinateurs Sécurité Mesures Examens Guides de l'étudiant. COMPUTERS / Certification Guides / General. bisacsh Computer networks Security measures Examinations fast |
title | CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
title_auth | CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
title_exact_search | CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
title_full | CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
title_fullStr | CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
title_full_unstemmed | CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
title_short | CISA - Certified Information Systems Auditor Study Guide : |
title_sort | cisa certified information systems auditor study guide aligned with the cisa review manual 2019 to help you audit monitor and assess information systems |
title_sub | Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. |
topic | Computer networks Security measures Examinations Study guides. Réseaux d'ordinateurs Sécurité Mesures Examens Guides de l'étudiant. COMPUTERS / Certification Guides / General. bisacsh Computer networks Security measures Examinations fast |
topic_facet | Computer networks Security measures Examinations Study guides. Réseaux d'ordinateurs Sécurité Mesures Examens Guides de l'étudiant. COMPUTERS / Certification Guides / General. Computer networks Security measures Examinations Study guides |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2579507 |
work_keys_str_mv | AT doshihemang cisacertifiedinformationsystemsauditorstudyguidealignedwiththecisareviewmanual2019tohelpyouauditmonitorandassessinformationsystems |