Books on the topic 'Computer Auditing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer Auditing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Krist, Martin A. A standard for auditing computer applications: Auditing implemented applications. Boca Raton: Auerbach, 1998.
Find full textPerry, William E. A standard for auditing computer applications: Auditing systems requirements. Boston: Auerbach, 1995.
Find full textPerry, William E. A standard for auditing computer applications: Auditing client/server systems. Boston: Auerbach, 1994.
Find full textPerry, William E. A standard for auditing computer applications: Auditing information services defects. Boston: Auerbach, 1996.
Find full textPerry, William E. A standard for auditing computer applications: Auditing client/server systems. Boston: Auerbach, 1994.
Find full textRuss, Rogers, Criscuolo Paul, and Petruzzi Mike, eds. Nessus network auditing. 2nd ed. Burlington, MA: Syngress, 2008.
Find full textControlling and auditing small computer systems. [Toronto]: Canadian Institute of Chartered Accountants, 1986.
Find full textPerry, William E. A standard for auditing computer application: Auditing the systems maintenance process. Boston: Auerbach, 1995.
Find full textAuditors, Institute of Internal, ed. Computer audit and control handbook. Oxford: Butterworth-Heinemann, 1995.
Find full textWeiss, Martin M. Auditing IT infrastructures for compliance. Sudbury, MA: Jones & Bartlett Learning, 2011.
Find full textBishop, Matt. The RIACS intelligent auditing and categorizing system. [Moffett Field, CA]: Research Institute for Advanced Computer Science, 1989.
Find full textKuong, Javier F. Computer auditing, security, and internal control manual. Englewood Cliffs, N.J: Prentice-Hall, 1987.
Find full textParker, Tom. Cyber adversary characterization: Auditing the hacker mind. Rockland, MA: Syngress, 2004.
Find full textG, Solomon Michael, ed. Auditing IT infrastructures for compliance. Sudbury, MA: Jones & Bartlett Learning, 2011.
Find full textLehman, Mark W. Computer-assisted auditing with Microsoft Great Plains dynamics. Mason, Ohio: South-Western/Thomson Learning, 2003.
Find full textRomanosky, Sasha. Managing and auditing IT vulnerabilities. [Altamonte Springs, Fla. :]: The Institute of Internal Auditors, 2006.
Find full textMarcella, Albert J. Auditing IBM's Customer information control system. Altamonte Springs, Fla: Institute of Internal Auditors, 1991.
Find full textCanadian Institute of Chartered Accountants, ed. Application of computer-assisted audit techniques. 2nd ed. Toronto: Canadian Institute of Chartered Accountants, 2007.
Find full textPerry, William E. A standard for auditing computer applications: Computer-related crime audits and postimplementation reviews. Boston: Auerbach Publications, 1993.
Find full textVallabhaneni, S. Rao. Auditing purchased software: Acquisition, adaptation, and installation. Altamonte Springs, Fla: Institute of Internal Auditors, 1985.
Find full textservice), SpringerLink (Online, ed. Auditing and GRC Automation in SAP. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textPerry, William E. A standard for auditing computer applications: Assessing the systems environment. Boston: Auerbach, 1996.
Find full textPerry, William E. A standard for auditing computer applications: Reviewing IS general controls. Boston: Auerbach Publications, 1992.
Find full textCoderre, David G. Computer Aided Fraud Prevention and Detection. New York: John Wiley & Sons, Ltd., 2009.
Find full textKansas. Legislature. Legislative Division of Post Audit. Computer security audit report: Surplus computer equipment : determining whether state agencies effectively remove software and agency data from surplus computers. Topeka, Kan. (800 Southwest Jackson St., ste. 1200, Topeka 66612-2212): Kansas Legislative Division of Post Audit, 2008.
Find full textIsrani, Angela. Computer auditing: Application of the Leavitt model to an audit firm. Manchester: UMIST, 1995.
Find full textSteinauer, Dennis D. Security of personal computer systems: A management guide. Gaithersburg, MD: U.S. National Bureau of Standards, 1985.
Find full textMike, Schiller, and Wheeler Kevin, eds. IT auditing: Using controls to protect information assets. 2nd ed. New York: McGraw-Hill, 2011.
Find full textMontana. Legislature. Legislative Audit Division. Computer disposal policy: Information system audit. Helena, MT: Legislative Audit Division, State of Montana, 2005.
Find full textBayuk, J. L. Stepping through the IS audit: What to expect, how to prepare. 2nd ed. Rolling Meadows, IL: Information Systems Audit and Control Assoc., 2004.
Find full textMontana. Legislature. Office of the Legislative Auditor. EDP audit, Department of Administration, computer disaster recovery. Helena, Mont. (Rm. 135, State Capitol, Helena 59620): The Office, 1985.
Find full textBiometric and auditing issues addressed in a throughput model. Charlotte, N.C: Information Age Pub., 2011.
Find full textO'Leary, Daniel E. Expertsystems and artificial intelligence in internal auditing. Princeton, N.J: M. Wiener Publishers, 1995.
Find full textBoritz, Jefim Efrim. Computer control & audit guide. Waterloo, Ont: Centre for Information Systems Assurance, School of Accountancy, University of Waterloo, 1999.
Find full textBoritz, Jefim Efrim. Computer control & audit guide. 6th ed. Waterloo, Ont: Centre for Accounting Research and Education, University of Waterloo, 1987.
Find full textBoritz, Jefim Efrim. Computer control & audit guide. 9th ed. Waterloo, Ont: Centre for Accounting Research and Education, University of Waterloo, 1995.
Find full textW, Stringer Kenneth, Deloitte, Haskins & Sells., and Deloitte Touche Tohmatsu International, eds. Statistical techniques for analytical review in auditing. 2nd ed. New York: John Wiley, 1996.
Find full textStringer, Kenneth W. Statistical techniques for analytical review in auditing. New York: Wiley, 1986.
Find full textMontana. Legislature. Office of the Legislative Auditor. EDP audit, mainframe computer security, Department of Administration. Helena, Mont. (Rm. 135, State Capitol, Helena 59620): The Office, 1985.
Find full textPerry, William E. A standard for auditing computer applications: Using teams to improve the audit process. Boston: Auerbach, 1994.
Find full textMelber, Derek. Auditing security and controls of Windows 2000 and Windows XP Professional. Altamonte Springs, Fla: Institute of Internal Auditors Research Foundation, 2005.
Find full textComputer-aided fraud prevention and detection: A step-by-step guide. Hoboken, N.J: Wiley & Sons, 2009.
Find full text