Schlagwörter |
2004 CISA examination general information, Alternative software development strategies, Application Controls, Auditing disaster recovery and business continuity, Auditing information security management and logical ac, Auditing infrastructure and operations, Auditing network infrastructure security, Auditing systems development, acquisition and maintenan, Auditing the management, planning and organization of i, Business application system development, acquisition, Business application systems, Business continuity/disaster recovery planning, Business process evaluation and risk management, Business process reengineering and process change proje, CISA examination and COBIT, Control Self-Assessment, Corporate Governance, Disaster recovery and business continuity, Environmental exposures and controls, Implementation and maintenance, Importance of information security management, Information systems architecture and software, Information systems hardware, Information systems maintenance practices, Information systems management practices, Information systems network infrastructure, Information systems operations, Information systems strategy, Internal control(s), Is Organizational structutre and responsibilities, ISACA Standards and Guidelines for is Auditing, IT Governance, Logical access exposures and controls, Management planning and organization of is, Network infrastructure security, Performing an is audit, Personal computer (Laptop) security, Physical access exposures and controls, Policies and procedures, Practice questions, Project management practices, Protection of information assets, Risk analysis, Risk Management, Software development process improvement practices, System development tolls and productivity AIDS, Technical infrastructure and operational practices |