What is included with this book?
Preface | |
Acknowledgements | |
Understanding Operational Auditing | |
Approaches to operational auditing | |
Business processes | |
Developing operational review programmes for managerial and audit use | |
Governance processes | |
Risk management processes | |
Internal control processes | |
Review of the control environment | |
Reviewing internal control over financial reporting - the Sarbanes-Oxley approach | |
Business/ management techniques and their impact on control and audit | |
Control self assessment | |
Evaluating the internal audit activity | |
Auditing Key Functions | |
Auditing the finance and accounting functions | |
Auditing subsidiaries and remote operating units | |
Auditing contracts and the purchasing function | |
Auditing operations and resource management | |
Auditing marketing and sales | |
Auditing distribution | |
Auditing human resources | |
Auditing research and development | |
Auditing security | |
Auditing environmental responsibility | |
Auditing Information Technology | |
Auditing information technology | |
IT Strategic Planning | |
IT Organisation | |
IT Policy Framework | |
Information Asset Register* | |
Capacity Management | |
Information Management (IM)* | |
Records Management (RM)* | |
Knowledge Management (KM)* | |
IT sites and Infrastructure (including physical security) | |
Processing Operations | |
Back-up and Media Management | |
Removable media | |
System and Operating Software (including patch management) | |
System Access Control (or logical security) | |
Personal Computers (including laptops and PDAs) | |
Remote Working | |
Internet Usage | |
Software Maintenance (including change management) | |
Networks | |
Databases | |
Data Protection | |
Freedom of Information | |
Data Transfer and Sharing (Standards and Protocol Guidelines) | |
Legal Responsibilities | |
Facilities Management | |
System Development | |
Software Selection | |
Contingency Planning | |
Human Resources information security | |
Monitoring and Logging | |
Information Security incidents | |
Data Retention and Disposal | |
Electronic Data Interchange (EDI) and the use of secure networks | |
Viruses | |
User Support | |
BACS (i.e. automated cash/funds transfer) | |
Spreadsheet design and good practice | |
IT Health Checks | |
IT Accounting | |
Appendices | |
Index to SAPGs on Wiley's website | |
SAPGs - use in relation to business processes | |
International data protection legislation | |
International freedom of information legislation | |
Bibliography | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.