Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans

Hardcover
from $0.00

Author: Yusuf F. Musaji

ISBN-10: 0471383716

ISBN-13: 9780471383710

Category: AS / 400

A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors\ This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect them to each other and to the global marketplace. Auditing and Security: AS/400, NT, Unix, Networks, and Disaster Recovery Plans is the first book on IT...

Search in google:

A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect them to each other and to the global marketplace. Auditing and Security: AS/400, NT, Unix, Networks, and Disaster Recovery Plans is the first book on IT security written specifically for the auditor, detailing what controls are necessary to ensure a secure system regardless of the specific hardware, software, or architecture a company runs. The author uses helpful checklists and diagrams and a practical, rather than theoretical, method to understanding and auditing a company's IT security systems and their requirements. This comprehensive volume covers the full range of issues relating to security audits, including: * Hardware and software * Operating systems * Network connections * The cooperation of logical and physical security systems * Disaster recovery planning Booknews This guide for auditors, IT managers, controllers, and CIOs presents tools needed to ensure that a company's IT systems are adequately protected against security breaches. IT and financial consultant Musaji begins with an overview of the structure of information systems and their security requirements. Other topics include the cooperation of logical and physical security systems, IBM AS/400 architecture and applications, AS/400 audit objectives and procedures, security features of the Windows NT server, Unix, networks, and disaster recovery planning. Annotation c. Book News, Inc., Portland, OR (booknews.com)

1Security Management12Physical Security403IBM AS/400 Architecture and Applications814AS/400 Audit Objectives and Procedures127Appendix 4AAudit Program1615Windows NT Server: Security Features182Appendix 5A222Appendix 5B2416Unix336Appendix 6AGlossary of Unix Terms419Appendix 6BUnix Environment Control Features4217Networks4488Disaster Recovery Planning493Index527

\ BooknewsThis guide for auditors, IT managers, controllers, and CIOs presents tools needed to ensure that a company's IT systems are adequately protected against security breaches. IT and financial consultant Musaji begins with an overview of the structure of information systems and their security requirements. Other topics include the cooperation of logical and physical security systems, IBM AS/400 architecture and applications, AS/400 audit objectives and procedures, security features of the Windows NT server, Unix, networks, and disaster recovery planning. Annotation c. Book News, Inc., Portland, OR (booknews.com)\ \