Download Audit and Assurance Books Links

Pipe Flow 1 Single-phase Flow Assurance Dr. Ove Bratlan

How to simulate liquid and gas flow in pipelines and networks. Includes a survey of existing software.

Download Link
http://www.mediafire.com/?znrdny1univ

----------------

Cyber-Security and Global Information Assurance

In the 2003 publication, The National Strategy to Secure Cyberspace, the
United States Government acknowledged, “our economy and national security is
now fully dependent on information technology and the information
infrastructure” (U. S. Government, 2003, p. 9). The candid use of the word
“fully” is no overstatement. If the Internet infrastructure were
significantly compromised, critical systems supporting supply chains,
financial markets and telecommunications, for example, could simultaneously
be severely handicapped or completely cease from functioning.


Table Of Contents:
Chapter I: Dynamic Modeling of the Cyber Security Threat Problem: The Black
Market for Vulnerabilities
Chapter II: An Attack Graph Based Approach for Threat Identification of an
Enterprise Network
Chapter III: Insider Threat Prevention, Detection and Mitigation
Chapter IV: An Autocorrelation Methodology for the Assessment of Security
Assurance
Chapter V: Security Implications for Management from the Onset of Information
Terrorism
Section II: Organizational and Human Security
Chapter VI: The Adoption of Information Security Management Standards: A
Literature Review
Chapter VII: Data Smog, Techno Creep and the Hobbling of the Cognitive
Dimension
Chapter VIII: Balancing the Public Policy Drivers in the Tension between
Privacy and Security
Chapter IX: Human Factors in Security: The Role of Information Security
Professionals within Organizations
Chapter X: Diagnosing Misfits, Inducing Requirements, and Delineating
Transformations within Computer Network Operations Organizations
Chapter XI: An Approach to Managing Identity Fraud literature.
Section III: Emergency Response Planning
Chapter XII: A Repeatable Collaboration Process for Incident Response
Planning
Chapter XIII: Pandemic Influenza, Worker Absenteeism and Impacts on Critical
Infrastructures: Freight Transportation as an Illustration
Chapter XIV: Information Sharing: A Study of Information Attributes and their
Relative Significance During Catastrophic Events
Chapter XV: An Overview of the Community Cyber Security Maturity Model
Section IV: Security Technologies
Chapter XVI: Server Hardening Model Development: A Methodology-Based Approach
to Increased System Security
Chapter XVII: Trusted Computing: Evolution and Direction
Chapter XVIII: Introduction, Classification and Implementation of Honeypots


Product Details:
* ISBN: 1605663263
* ISBN-13: 9781605663265
* Format: Hardcover, 381pp
* Publisher: IGI Global
* Pub. Date: April 2009

Download Link
http://www.mediafire.com/?q2rdyjmcxwi

----------------
How to Secure and Audit Oracle 10g and 11g

This guide demonstrates how to secure sensitive data and comply with
internal and eternal audit regulations using Oracle 10g and 11g. It
provides the hands-on guidance required to understand the complex options
provided by Oracle and the know-how to choose the best option for a
particular case. The book presents specific sequences of actions that
should be taken to enable, configure, or administer security-related
features. It includes best practices in securing Oracle and on Oracle
security options and products. By providing specific instructions and
examples this book bridges the gap between the individuals who install and
configure a security feature and those who secure and audit it.


Table Of Contents:
1 Introduction: How Th is Book Will Help You Be Secure and Compliant
2 Hardening the Database
3 Securing the Listener
4 Account Security
5 Cryptography, Oracle Wallets, and Oracle PKI
6 Authentication
7 Encrypting Data-in-Transit
8 Encrypting Data-at-Rest
9 Standard Auditing
10 Mandatory and Administrator Auditing
11 Fine-Grained Auditing
12 Auditing Before/After Values and Monitoring Selected Data
13 Oracle Audit Vault
14 Database Activity Monitoring
15 Privileges and Authorization
16 Virtual Private Database
17 Oracle Database Vault
Appendix A
Appendix B
Index

Product Details:

* ISBN: 1420084127
* ISBN-13: 9781420084122
* Format: Hardcover, 470pp
* Publisher: Taylor & Francis, Inc.
* Pub. Date: March 2009

Download Link
http://www.mediafire.com/file/xtgmolnyn3m

----------------

Information Technology Control and Audit

Gallegos Frederick - Information Technology Control and Audit, Second Edition

Information Technology Control and Audit, Second Edition is an excellent introductory textbook for IT auditing. It covers a wide range of topics in the field including the audit process, the legal environment of IT auditing, security and privacy, and much more.This textbook first examines the foundation of IT audit and control, discussing what IT auditing involves and the guidance provided by organizations in dealing with control and auditability issues. It then analyzes the process of audit and review, explores IT governance and control, and discusses the CobiT framework and steps that align IT decisions with business strategy. This volume examines project management processes that ensure that projects are controlled from inception through integration.It continues by addressing auditing IT acquisition and implementation, describing risks and controls as related to the life cycle of application systems. It highlights the purchase and installation of new systems, as well as change management. The next section examines the auditing of IT operations in both standalone and global environments, covering types of IT operation, issues related to specific platforms, risk and control assessment, and audit methods and support tools.The textbook concludes with a review of emerging issues, providing undergraduate and graduate students with a thorough overview of a topic critical to organizational security and integrity

Download Link
http://www.mediafire.com/file/yym4czzhduz

-----------------

Information Technology Control And Audit 3rd Edition

Saturday, 05 December 2009 15:29

Now in its third edition, this book is an excellent introductory reference to
IT governance, controls, and auditing. It covers a wide range of topics in the
field. It reviews pertinent legislation, discusses the future of auditing in
the 21st century, and examines governance, strategy and standards, and
acquisition and implementation. In a section on delivery and support, it
explores service management, service continuity, systems management, and
operations management. Finally, the authors review advanced topics such as
virtual environment, virtual security, e-commerce, and enterprise resource
planning. This new edition also includes guidelines for preparing for CISA
Exam, and includes numerous illustrations, graphs and charts to help readers
visualize the concepts.


Table Of Contents:
I. A Foundation for IT Audit and Control
II. Auditing IT Planning and Organization
III. IT Acquisition and Implementation
IV. IT Delivery and Support
V. Advanced Topics
Appendices
Index


Product Details:

* ISBN: 1420065505
* ISBN-13: 9781420065503
* Format: Hardcover, 728pp
* Publisher: Taylor & Francis, Inc.
* Pub. Date: November 2008
* Edition Number: 3

Download Link
http://www.mediafire.com/file/qykqtymn5zm

----------------
Internal Audit

Internal Audit: Efficiency Through Automation teaches state-of-the-art
computer-aided audit techniques, with practical guidelines on how to get
much needed data, overcome organizational roadblocks, build data analysis
skills, as well as address Continuous Auditing issues.


Table Of Contents:
Chapter 1 CAATTs History,
Chapter 2 Audit Technology,
Chapter 3 Continuous Auditing,
Chapter 4 CAATTs Benefits and Opportunities,
Chapter 5 CAATTs for Broader Scoped Audits,
Chapter 6 Data Access and Testing,
Chapter 7 Developing CAATT Capabilities,
Chapter 8 Challenges for Audit,

Product Details:

* ISBN: 0470392428
* ISBN-13: 9780470392423
* Format: Hardcover, 250pp
* Publisher: Wiley, John & Sons, Incorporated
* Pub. Date: December 2008

Download Link
http://www.mediafire.com/file/igkdnd1wytr

----------------

Measurement and Internal Audit

Download Link
http://www.mediafire.com/file/ze5y4c4izmr