000 02313cam a22004574a 4500
001 16611337
003 AUA.1
005 20130923090036.0
008 110114s2011 nyua b 001 0 eng
010 _a 2011000207
015 _aGBB0A9989
_2bnb
016 7 _a015648741
_2Uk
020 _a9780071742382
020 _a0071742387
035 _a(OCoLC)ocn664323613
040 _aDLC
_cDLC
_dYDX
_dUKM
_dYDXCP
_dBWX
_dCDX
_dDLC
042 _apcc
050 0 0 _aQA 76.9 .A93
_bD38 2011
082 0 0 _a005.8
_222
100 1 _aDavis, Chris
_q(Christopher Michael)
_931751
245 1 0 _aIT auditing :
_busing controls to protect information assets /
_cChris Davis, Mike Schiller ; with Kevin Wheeler.
250 _a2nd ed.
260 _aNew York :
_bMcGraw-Hill,
_cc2011.
300 _axxix, 480 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
650 0 _aElectronic data processing
_xAuditing.
_931752
650 0 _aInformation auditing.
_931753
650 0 _aComputer security.
_931754
650 0 _aComputer networks
_xSecurity measures.
_931755
700 1 _aSchiller, Mike.
_931756
700 1 _aWheeler, Kevin.
_931757
856 4 2 _3Contributor biographical information
_uhttp://catdir.loc.gov/catdir/enhancements/fy1107/2011000207-b.html
856 4 2 _3Publisher description
_uhttp://catdir.loc.gov/catdir/enhancements/fy1107/2011000207-d.html
856 4 1 _3Table of contents only
_uhttp://catdir.loc.gov/catdir/enhancements/fy1107/2011000207-t.html
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBOOK
_hQA 76.9 .A93
_iD38 2011
999 _c9172
_d9172
952 _w2013-02-18
_pAUA012642
_v25.00
_r2013-09-23
_40
_00
_bAUA.1
_m1
_10
_oQA 76.9 .A93 D38 2011
_d2013-02-18
_t1
_8BKS
_h13395
_70
_cGS
_2lcc
_yBOOK
_s2013-09-22
_l3
_aAUA.1
952 _w2013-02-18
_pAUA012643
_v25.00
_r2013-02-18
_40
_00
_bAUA.1
_10
_oQA 76.9 .A93 D38 2011
_d2013-02-18
_t2
_8BKS
_h13396
_70
_cGS
_2lcc
_yBOOK
_aAUA.1
952 _w2013-02-18
_pAUA012644
_v25.00
_r2013-02-18
_40
_00
_bAUA.1
_10
_oQA 76.9 .A93 D38 2011
_d2013-02-18
_t3
_8BKS
_h13397
_70
_cGS
_2lcc
_yBOOK
_aAUA.1