Information technology auditing / James A. Hall. 6
By: Hall, James A., 4 0 16 [, ] | [, ] |
Contributor(s): 5 6 [] |
Language: Unknown language code Summary language: Unknown language code Original language: Unknown language code Series: ; Mason, Ohio : Cengage Learning Asia [2017];copyright 201746Edition: 4th editionDescription: 26 cm. xv, 635 pages : illustrationsContent type: text Media type: unmediated Carrier type: volumeISBN: 9789814780308ISSN: 2Other title: 6 []Uniform titles: | | Subject(s): -- 2 -- 0 -- -- | -- 2 -- 0 -- 6 -- | 2 0 -- | -- -- 20 -- | | -- -- Auditing Electronic data processing -- -- 20 -- | -- -- -- 20 -- --Genre/Form: -- 2 -- Additional physical formats: DDC classification: | LOC classification: | QA76.9.A93 | H34 20172Other classification:| Item type | Current location | Home library | Collection | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|
| Book | PLM | PLM Circulation Section | Circulation-Circulating | QA76.9.A93 H35 2017 (Browse shelf) | Available | C37385 |
Browsing PLM Shelves , Shelving location: Circulation Section , Collection code: Circulation-Circulating Close shelf browser
|
|
No cover image available |
|
|
No cover image available |
|
||
| QA76.9.A73 M33 1993 Computer systems : architecture, organization, and programming / | QA76.9.A73 M37 1991 Systems application architecture : common user access / | QA76.9.A73 M87 2000 Principles of computer architecture / | QA76.9.A93 H35 2017 Information technology auditing / | QA76.9.B45 H43 2023 Data fabric and data mesh approaches with AI : a guide to AI-based data cataloging, governance, integration, orchestration, and consumption / | QA76.9.C55 R46 1993 Introduction to client/server systems : a practical guide for systems professionals / | QA76.9.C55 R83 1997 Practical analysis and design for client/server and GUI systems / |
Includes index;ACL software included 56
Auditing and internal control --;Auditing IT governance controls --;Security part I: auditing operating systems and networks. --;Security part II: auditing database systems --;Systems development and program change activities --;Transaction processing and financial reporting systems overview --;Computer-assisted audit tools and techniques --;Data structures and CAATTs for data extractsion --;Auditing the revenue cycle --;Enterprise, resource planning systems --;Business ethics, fraud, and fraud detection --;Glossary --;Index chapter 1.;chapter 2.;chapter 3.;chapter 4.;chapter 5.;chapter 6.;chapter 7.;chapter 8.;chapter 9.;chapter 10. dt Auditing the expenditure cycle --;chapter 11.;chapter 12.
5
5

There are no comments for this item.