IT Auditing: Using Controls to Protect Information Assets McGraw Hill Publishing, 2007


CanCo is proud to announce that Michael P Cangemi has contributed the Forward for the new book IT Auditing: Using Controls to Protect Information Assets, by Chris Davis, Mike Schiller and Kevin Wheeler. (ISBN 0-07-226343-1) published by McGraw-Hill, in January 2007. Available at amazon.com or mcgrawhill.com.

IT Auditing provides real-life practical guidance from experts how have performed IT audit work in real corporations.  Written for seasoned IT auditors who want to expand their skills and new IT auditors who need guidance and exposure to new skill sets, this book covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Readers will learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications.  Up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard are included.
Click here to purchase this book.
About the Authors:
Chris Davis, CISA, CISSP, shares his experience from architecting, hardening, and auditing systems.  He has trained auditors and forensic analysts.  Davis is the coauthor of the bestselling Hacking Exposed: Computer Forensics.
Mike Schiller, CISA, has 14 years of experience in the IT audit field, most recently as the worldwide IT Audit Manager at Texas Instruments.
Kevin Wheeler, CISA, CISSP, NSA IAM/IEM, is the founder and CEO of InfoDefense and has more than ten years of IT security experience.