To see the other types of publications on this topic, follow the link: Computer Auditing.

Books on the topic 'Computer Auditing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer Auditing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Chambers, Andrew D. Computer auditing. 3rd ed. (London): ELBS with Pitman, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Standard for auditing computer applications. Boca Raton: Auerbach, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krist, Martin A. A standard for auditing computer applications: Auditing implemented applications. Boca Raton: Auerbach, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Perry, William E. A standard for auditing computer applications: Auditing systems requirements. Boston: Auerbach, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Perry, William E. A standard for auditing computer applications: Auditing client/server systems. Boston: Auerbach, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Perry, William E. A standard for auditing computer applications: Auditing information services defects. Boston: Auerbach, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Perry, William E. A standard for auditing computer applications: Auditing client/server systems. Boston: Auerbach, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Russ, Rogers, Criscuolo Paul, and Petruzzi Mike, eds. Nessus network auditing. 2nd ed. Burlington, MA: Syngress, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Network security auditing. Indianapolis, Ind: Cisco Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Controlling and auditing small computer systems. [Toronto]: Canadian Institute of Chartered Accountants, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Perry, William E. A standard for auditing computer application: Auditing the systems maintenance process. Boston: Auerbach, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Auditors, Institute of Internal, ed. Computer audit and control handbook. Oxford: Butterworth-Heinemann, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Weiss, Martin M. Auditing IT infrastructures for compliance. Sudbury, MA: Jones & Bartlett Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bishop, Matt. The RIACS intelligent auditing and categorizing system. [Moffett Field, CA]: Research Institute for Advanced Computer Science, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kuong, Javier F. Computer auditing, security, and internal control manual. Englewood Cliffs, N.J: Prentice-Hall, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Parker, Tom. Cyber adversary characterization: Auditing the hacker mind. Rockland, MA: Syngress, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

G, Solomon Michael, ed. Auditing IT infrastructures for compliance. Sudbury, MA: Jones & Bartlett Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lehman, Mark W. Computer-assisted auditing with Microsoft Great Plains dynamics. Mason, Ohio: South-Western/Thomson Learning, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Auditing computer security: A manual with case studies. New York: Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Romanosky, Sasha. Managing and auditing IT vulnerabilities. [Altamonte Springs, Fla. :]: The Institute of Internal Auditors, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Implementing database security and auditing. Boston: Digital Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Marcella, Albert J. Auditing IBM's Customer information control system. Altamonte Springs, Fla: Institute of Internal Auditors, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Canadian Institute of Chartered Accountants, ed. Application of computer-assisted audit techniques. 2nd ed. Toronto: Canadian Institute of Chartered Accountants, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Perry, William E. A standard for auditing computer applications: Computer-related crime audits and postimplementation reviews. Boston: Auerbach Publications, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Vallabhaneni, S. Rao. Auditing purchased software: Acquisition, adaptation, and installation. Altamonte Springs, Fla: Institute of Internal Auditors, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Network auditing: A control assessment approach. New York: John Wiley, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

service), SpringerLink (Online, ed. Auditing and GRC Automation in SAP. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Computer audit, control, and security. New York: Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Perry, William E. A standard for auditing computer applications: Assessing the systems environment. Boston: Auerbach, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Perry, William E. A standard for auditing computer applications: Reviewing IS general controls. Boston: Auerbach Publications, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Auditing software development: A manual with case studies. New York: Wiley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Coderre, David G. Computer Aided Fraud Prevention and Detection. New York: John Wiley & Sons, Ltd., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kansas. Legislature. Legislative Division of Post Audit. Computer security audit report: Surplus computer equipment : determining whether state agencies effectively remove software and agency data from surplus computers. Topeka, Kan. (800 Southwest Jackson St., ste. 1200, Topeka 66612-2212): Kansas Legislative Division of Post Audit, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Israni, Angela. Computer auditing: Application of the Leavitt model to an audit firm. Manchester: UMIST, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Steinauer, Dennis D. Security of personal computer systems: A management guide. Gaithersburg, MD: U.S. National Bureau of Standards, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mike, Schiller, and Wheeler Kevin, eds. IT auditing: Using controls to protect information assets. 2nd ed. New York: McGraw-Hill, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Montana. Legislature. Legislative Audit Division. Computer disposal policy: Information system audit. Helena, MT: Legislative Audit Division, State of Montana, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bayuk, J. L. Stepping through the IS audit: What to expect, how to prepare. 2nd ed. Rolling Meadows, IL: Information Systems Audit and Control Assoc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Montana. Legislature. Office of the Legislative Auditor. EDP audit, Department of Administration, computer disaster recovery. Helena, Mont. (Rm. 135, State Capitol, Helena 59620): The Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Biometric and auditing issues addressed in a throughput model. Charlotte, N.C: Information Age Pub., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

O'Leary, Daniel E. Expertsystems and artificial intelligence in internal auditing. Princeton, N.J: M. Wiener Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Boritz, Jefim Efrim. Computer control & audit guide. Waterloo, Ont: Centre for Information Systems Assurance, School of Accountancy, University of Waterloo, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Boritz, Jefim Efrim. Computer control & audit guide. 6th ed. Waterloo, Ont: Centre for Accounting Research and Education, University of Waterloo, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Boritz, Jefim Efrim. Computer control & audit guide. 9th ed. Waterloo, Ont: Centre for Accounting Research and Education, University of Waterloo, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

W, Stringer Kenneth, Deloitte, Haskins & Sells., and Deloitte Touche Tohmatsu International, eds. Statistical techniques for analytical review in auditing. 2nd ed. New York: John Wiley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Stringer, Kenneth W. Statistical techniques for analytical review in auditing. New York: Wiley, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Montana. Legislature. Office of the Legislative Auditor. EDP audit, mainframe computer security, Department of Administration. Helena, Mont. (Rm. 135, State Capitol, Helena 59620): The Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Perry, William E. A standard for auditing computer applications: Using teams to improve the audit process. Boston: Auerbach, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Melber, Derek. Auditing security and controls of Windows 2000 and Windows XP Professional. Altamonte Springs, Fla: Institute of Internal Auditors Research Foundation, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Computer-aided fraud prevention and detection: A step-by-step guide. Hoboken, N.J: Wiley & Sons, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography