0% found this document useful (0 votes)
477 views5 pages

16 Bibliography

This document provides a bibliography of 57 books and 10 research publications related to auditing, computer systems, security, and networking. The books cover topics such as operating systems, auditing computer systems, database management, local area networks, and computer security strategies. The research publications are modules from the Institute of Internal Auditors on systems auditability and control.

Uploaded by

salim7676
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
477 views5 pages

16 Bibliography

This document provides a bibliography of 57 books and 10 research publications related to auditing, computer systems, security, and networking. The books cover topics such as operating systems, auditing computer systems, database management, local area networks, and computer security strategies. The research publications are modules from the Institute of Internal Auditors on systems auditability and control.

Uploaded by

salim7676
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

BIBLIOGRAPHY

BOOKS

1. Andrew S. Tanabaum -Operating System, Design &Implementation, Prentice


Hall of India Pvt Ltd., New Delhi, 990.

2 -
Brian Jenkins & Anthony Pinkney An Audit Approach to Computers A -
New Practice Manual, Thc Institute of Chartered Accountants in
England & Wales, 1978.

3. Charlotte Eudy Mcconn, M.S.CDP - Business Computer Systems - Design,


Programming and Maintenance with case studies - Prentice Hall of
India Private Ltd. New Delhi, 1990.

4. -
Donn B. Parker Managers Guide to Computer Security - Reston Publishing
Company Inc. A prentice - Hall Company, Reston, Virginia, 1981.

5. Donald k Watne & Peter B.B. Turney - Auditing EDP Systmes Second -
Edition - Prentice Hall lnternational INC. Parts 1 & 2, 1984

6. N. Derek Arnold - Unix Security - A Practical Tutorial - McGRAW HILL


Inc., 1992

7. -
Dimitris N. Chorafas Designing & Implementing Local Area Networks -
McGRAW HILL Inc. 1984.

8. -
Elise G. Jancura Robert Boos Establishing Controls and Auditing the
Computersied Accounting System - Van Nostrand Reinhold Company,
1981

9. -
Elise G. Jancura Audit and Control of Computer Systems - 1974.

10. Graeme Ward & Denis Marshall -


Internal Audit Hand Book -
Recommended Codes and Practices for the audit of Data Processing
-
Activities The Institute of Internal Auditors UK, 1980.

11. -
Gordon B. Davis Auditing & EDP - American Institute of Certified Public
Accountants, New York, 1968.
-
Gordon C Everst Database Management Objectives, Systems Function and
Administration, MGRAW Hill, New York, USA, 1986.

-
Javier F. Kuong, Gerald LIsaacson, Chester M.Winters Microcomputer
Security, Auditability and Controls - Management Advisory
Publications? P.O.Box 151, Wellesley Hills MASS. 02181, 1985.

-
Javier F. Kuong Controls for Advanced on-IineData Base System -
Management Advisory Publications, MASS. 02181, 1983.

-
James Arlin Cooper Computer & Communications Security - Strategies for
-
1990s McGRAW HALL Company, 1989.

Jason Lamb, Stanley (STOSH) R. Jarocki & Anna M.Seijas - Netware


Security: Configuring and Auditing a Trusted Environment - A Novell
Cooperative Research Report, 1991.

-
John Muster, Peter Birn and Lumix Unk Power utilities for power users,
BPB Publications, New Delhi, 1989.

-
T, Perry, Joseph G. Lateer Understanding Oracle BPB Publications, Delhi,
India. 1989.

-
R.V. Jacobson PC V i m Contorl Handbook, Miller Freeman Publications,
San Francisco, U.S.A, 1990.

-
Keith Heamden - A hand book of Computer Security Kogan Page.

Kamal Gupta - Contemporary Auditing - Third Edition - Tata McGRAW HIll


publishing Company Ltd., New Delhi, 1986.

-
Kishor Shah S. Tandon A Banej i & Pinki Shah Guide to Computer Data
Processing for Accountants and Auditors. Wadhwa and Company,
Nagpur, India, 1987.

-
V.P. Lane Security of Computer Based Information Systems - Macmillan
Education Ltd., 1985.
Michael A. Murphy, Xenia Ley Parker - Hand Book of EDP Auditing -
Second Edition Coopers & Lybrand, Warren Gorham & Lamond,
Boston, New York, 1989.

Michael G. Grottola - The Unix Audit - Using Unix to Audit Unix, 1993.

Per Brinch Hansen - Operating System Principles -Eastern Economy Edition,


1990.

-
Paul J. Rutternan & Arthur Young McClell ind Flowcharting for Auditors
(Moors & Co), 1976.

-
S. Rao Vallabhaneni - Auditing the Maintenance of Software Prentice Hall,
Inc. Englewood Clifts, NJ 07632, 1987.

-
S. Rao Vallabhaneni Auditing Operational Application Systems on Large
- -
Computers A Step-By-Step Audit Approach The EDP Auditors
Foundation A'idit Guide Series, 1985.

S. Rao Vallabhaneni - Auditing Computer Security - A manual with case


studies - John wiley & Sons, New York, 1990.

- -
S. Rao Vallabhaneni Auditing Computer Security A manual with case
studies - John Wiley & Sons, New York, 1989.

-
Roben T. Mwller, Computer Audit, Control and Security - John Wiley &
Sons, New York, 1989.

- -
Ron Webber EDP Auditing Conceptual Foundations and Practice - I1
Edition - MCGRAH HALL International Editions, 1980.

-
Ruth Ashley - Judi N.Fernandez - Teaching Yourself Unix BPB Publications,
1990.

Sybil P. Parker - McGRAW HILL Dictionary of Computers - McGRAW


HILL Book Company, 1989.

A J . Thomas & LJ. Douglas - Audit of Computer Systems - Ncc Publications,


Manchester, England, 1983.
W. Thomas Porter, William E Perry - EDP Contmls and Auditing - Third
-
Edition Touche Ross & Co., William E Peny Enterprises Inc Kent
Publishing Company, Boston, MASS, 1981.

-
Ulless Black Computer Networks - Protocols, Standards and Interfaces -
Prentice Hall International Inc. New Jersey, U.S.A., 1987.

k K Vanwasi - A Dicitionary of Computers - Khanna Publishers, Delhi - 6.

William C Mair : Donald Wood; Keagle W. Davis -Computer Control Audit


- Minnesota - Partners : Touche Ross & Co., 1978.
-
William E Peny Auditing Information Systems - A step by step audit
approach - EDP Auditors Foundation Audit Guide Series, 1983.

William E. Perry - Report writing for EDP Auditors, Quality Assurance


Institute, Florida, U.S.A., 1982.

Advanced Computer Assisted Audit Techniques - Monograph Seies - The


EDP Auditors Foundation Inc. The Information Systems Control
Foundation. 1987.

Disaster Recovery : Contingency Planning & Program Evaluation - The


-
Chantico Series Information Sciences Inc. MASS, 1985.

- -
Advanced Netware Theory of Operations Version 2.1, Novell Inc. Provo,
UTAH, U.S.A., 1987.

A critical Review of the Certified Information Systems Auditor's Job Domain-


- -
First Edition Cisa Examination Review Book Vo1.2 Practice. 1994.

-
Illustrated Novell Netware BPM Publishing Inc., Delhi, India, 1989.

-
ED1 Control Guide ED1 Council of Australia and EDP Auditors Association.

Guidelines to controls for Data Processing Environment - The Institute of


Internal Auditors, 1983.

Computer Security Published by Computer Society of India, 1980.

Establishing the Internal Audit Function in EDP by the Institute of Internal


Auditors Inc.
RESEARCH PUBLICATIONS

1. Institute of Internal Auditors - Systems Auditability and Control Module 8


Audit and Control Environment.

2. Institute of Intenal Auditors - Systems Auditability and Control Module 3


using Information Technology in Auditing.

3. Institute of Internal Auditors - Systems Auditability and Control Module 4


Managing Computer Resources.

4. -
Institute of Internal Auditors Systems Auditability and Control Module 5
Managing Information and Developing Systems.

5. Institute of Internal Auditors - Systems Auditability and Control Module 6


Business Systems.

6. Institute of Internal Auditors - Systems Auditability and Control Module 7


End-User and Departmental Computing.

7. -
Institute of Internal Auditors Systems Auditability and Control Module 8
Telecommunications.

-
8. Institute of Internal Auditors Systems Adifability and Control Module 9
Security.

9. Institute of Internal Auditors -Systems Auditdility and Control Module 10


Contingency Planning.

10. Institute of Internal Auditors -Systems Auditdility and Control Module 11


Emerging Technologies.

You might also like