- 论坛徽章:
- 0
|
New Books\r\n\r\n * 101 ACL Applications: A Toolkit for Today’s Auditors\r\n * Audit, Control, and Security Features of SAP R/3\r\n * Better Change: Best Practices for Transforming your Organization\r\n * CAATTs and Other BEASTs for Auditors\r\n * Checklist and Guidelines for Reviewing Computer Security and Installations\r\n * Control Objectives for Net Centric Technology - Framework\r\n * Control Objectives for Net Centric Technology – Intranet/Extranet/Internet\r\n * Control Objectives for Net Centric Technology – Data Warehouse\r\n * Control Objectives for Net Centric Technology – Online Transaction Processing\r\n * Controls for Advanced/Online/Data Base Systems – Part 2\r\n * E-MAIL Security with PGP and PEM\r\n * Instructions for Auditing the MVS Operating System\r\n * Internet EDI Effective Accounting\r\n * Network Security\r\n * The Managers Guide to ISO 9000\r\n * Web Security and Commerce\r\n\r\n \r\nBooks\r\n\r\n * A Guide to SYS1.PARMLIB\r\n * A Standard for Auditing Computer Applications\r\n * Advanced Computer Assisted Audit Techniques\r\n * Application Audits\r\n * Audit, Control, and Security of CA ACF2 Environments\r\n * Audit, Control, and Security of CA Top Secret\r\n * Audit, Control, and Security of CICS Environments\r\n * Audit, Control, and Security of ICCF Environments\r\n * Audit, Control, and Security of Librarian\r\n * Audit, Control, and Security of Panvalet\r\n * Audit, Control, and Security of RACF Environments\r\n * Audit, Control, and Security of the IBM System/36\r\n * Audit, Control, and Security of the IBM System/38\r\n * Audit, Control, and Security of the Tandem Nonstop Systems\r\n * Audit, Control, and Security of the IBM AS/400-Version 2 Release 1.1\r\n * Audit, Control, and Security of the IBM AS/400 Release 3\r\n * Audit, Control, and Security of TSO Environments\r\n * Audit, Control, and Security Features of the UNIX Operating System\r\n * Audit, Control, and Security of AIX\r\n * Audit, Control, and Security of HP 3000\r\n * Auditing Computer Programs\r\n * Auditing Data Systems\r\n * Auditing Hardware and Software Contracts\r\n * Auditing Information Systems\r\n * Auditing Software Development (a manual with case studies)\r\n * Auditing the Small Business Computer\r\n * Checklist and Guidelines for Reviewing Computer Systems and Installations\r\n * Controls for Advanced/Online/Data Base Systems\r\n * DB2 Design and Development Guide\r\n * DB2 Technical Audit Guide\r\n * Developing and Implementing an Integrated Test Facility to Test Computerized Systems\r\n * EDI: An Audit Approach\r\n * EDP Audit Workpapers\r\n * Handbook of Relational Database Design\r\n * How to Prepare Audit and Test Plans for EDP Systems\r\n * How to Test Internal Control and Integrity in Computerized Systems\r\n * How to Train, Develop, and Mange the EDP Audit and Control Function\r\n * Introduction to Telecommunications\r\n * Introductory Guide to System Management Facilities (SMF)\r\n * Introduction to Audit and Control Issues within Client/Server Environment\r\n * Local Area Networks: The Second Generation\r\n * Planning EDP Audits\r\n * Security & Control in an Oracle Environment\r\n * Selecting EDP Audit Areas\r\n * TQM for Computer Software\r\n * UNIX - It\'s Use, Control, and Audit\r\n * UNIX - Standards and Guidelines - Raxco Security Policy Series\r\n * Understanding Local Area Networks\r\n * VMS Standards and Guidelines - Raxco Security\r\n * Windows NT 3.5 - Guidelines for Security, Audit, and Control\r\n\r\nVideo Tapes\r\n\r\n * A Guide to Auditing Application Systems\r\n * Auditing User Developed Software\r\n * Joseph Pleirer\'s \"Audit Department Manager Software Demonstration\"\r\n * Microcomputer Graphics\r\n * Risk Assessment for the Information Systems Auditor |
|