Minimum Security Requirements for Federal Information and Information Systems

Download Minimum Security Requirements for Federal Information and Information Systems PDF Online Free

Author :
Publisher : DIANE Publishing
ISBN 13 : 1437912702
Total Pages : 17 pages
Book Rating : 4.4/5 (379 download)

DOWNLOAD NOW!


Book Synopsis Minimum Security Requirements for Federal Information and Information Systems by :

Download or read book Minimum Security Requirements for Federal Information and Information Systems written by and published by DIANE Publishing. This book was released on 2009-05 with total page 17 pages. Available in PDF, EPUB and Kindle. Book excerpt: The E-Government Act, passed by the 107th Congress and signed into law by the Pres. in Dec. 2002, recognized the importance of info. security to the economic and nat. security interests of the U.S. Title III of the Act, entitled the Fed. Info. Security Mgmt. Act (FISMA), emphasizes the need for each fed. agency to develop, document, and implement an enterprise-wide program to provide info. security for the info. systems that support the operations of the agency. FISMA directed the promulgation of fed. standards for: (1) the security categorization of fed. info. and info. systems based on the objectives of providing appropriate levels of info. security; and (2) minimum security requirements for info. and info. systems in each such category.

Guide for Developing Security Plans for Federal Information Systems

Download Guide for Developing Security Plans for Federal Information Systems PDF Online Free

Author :
Publisher : Createspace Independent Publishing Platform
ISBN 13 : 9781495447600
Total Pages : 50 pages
Book Rating : 4.4/5 (476 download)

DOWNLOAD NOW!


Book Synopsis Guide for Developing Security Plans for Federal Information Systems by : U.s. Department of Commerce

Download or read book Guide for Developing Security Plans for Federal Information Systems written by U.s. Department of Commerce and published by Createspace Independent Publishing Platform. This book was released on 2006-02-28 with total page 50 pages. Available in PDF, EPUB and Kindle. Book excerpt: The purpose of the system security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. The system security plan also delineates responsibilities and expected behavior of all individuals who access the system. The system security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for a system. It should reflect input from various managers with responsibilities concerning the system, including information owners, the system owner, and the senior agency information security officer (SAISO). Additional information may be included in the basic plan and the structure and format organized according to agency needs, so long as the major sections described in this document are adequately covered and readily identifiable.

Guide to Protecting the Confidentiality of Personally Identifiable Information

Download Guide to Protecting the Confidentiality of Personally Identifiable Information PDF Online Free

Author :
Publisher : DIANE Publishing
ISBN 13 : 1437934889
Total Pages : 59 pages
Book Rating : 4.4/5 (379 download)

DOWNLOAD NOW!


Book Synopsis Guide to Protecting the Confidentiality of Personally Identifiable Information by : Erika McCallister

Download or read book Guide to Protecting the Confidentiality of Personally Identifiable Information written by Erika McCallister and published by DIANE Publishing. This book was released on 2010-09 with total page 59 pages. Available in PDF, EPUB and Kindle. Book excerpt: The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

CWSP Certified Wireless Security Professional Study Guide

Download CWSP Certified Wireless Security Professional Study Guide PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119211093
Total Pages : 850 pages
Book Rating : 4.1/5 (192 download)

DOWNLOAD NOW!


Book Synopsis CWSP Certified Wireless Security Professional Study Guide by : David D. Coleman

Download or read book CWSP Certified Wireless Security Professional Study Guide written by David D. Coleman and published by John Wiley & Sons. This book was released on 2016-09-07 with total page 850 pages. Available in PDF, EPUB and Kindle. Book excerpt: The most detailed, comprehensive coverage of CWSP-205 exam objectives CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objectives and gives you access to the Sybex interactive online learning system so you can go into the test fully confident in your skills. Coverage includes WLAN discovery, intrusion and attack, 802.11 protocol analysis, wireless intrusion prevention system implementation, Layer 2 and 3 VPN over 802.11 networks, managed endpoint security systems, and more. Content new to this edition features discussions about BYOD and guest access, as well as detailed and insightful guidance on troubleshooting. With more than double the coverage of the “official” exam guide, plus access to interactive learning tools, this book is your ultimate solution for CWSP-205 exam prep. The CWSP is the leading vendor-neutral security certification administered for IT professionals, developed for those working with and securing wireless networks. As an advanced certification, the CWSP requires rigorous preparation — and this book provides more coverage and expert insight than any other source. Learn the ins and outs of advanced network security Study 100 percent of CWSP-205 objectives Test your understanding with two complete practice exams Gauge your level of preparedness with a pre-test assessment The CWSP is a springboard for more advanced certifications, and the premier qualification employers look for in the field. If you’ve already earned the CWTS and the CWNA, it’s time to take your career to the next level. CWSP: Certified Wireless Security Professional Study Guide is your ideal companion for effective, efficient CWSP-205 preparation.

Auditing IT Infrastructures for Compliance

Download Auditing IT Infrastructures for Compliance PDF Online Free

Author :
Publisher : Jones & Bartlett Learning
ISBN 13 : 1284260925
Total Pages : 434 pages
Book Rating : 4.2/5 (842 download)

DOWNLOAD NOW!


Book Synopsis Auditing IT Infrastructures for Compliance by : Robert Johnson

Download or read book Auditing IT Infrastructures for Compliance written by Robert Johnson and published by Jones & Bartlett Learning. This book was released on 2022-10-11 with total page 434 pages. Available in PDF, EPUB and Kindle. Book excerpt: The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing.

DevSecOps Transformation Control Framework

Download DevSecOps Transformation Control Framework PDF Online Free

Author :
Publisher : Michael Bergman
ISBN 13 :
Total Pages : 109 pages
Book Rating : 4./5 ( download)

DOWNLOAD NOW!


Book Synopsis DevSecOps Transformation Control Framework by : Michael Bergman

Download or read book DevSecOps Transformation Control Framework written by Michael Bergman and published by Michael Bergman. This book was released on 2024-08-22 with total page 109 pages. Available in PDF, EPUB and Kindle. Book excerpt: This quick read book defines the DevSecOps Transformation Control Framework. Providing security control checklists for every phase of DevSecOps. Detailing a multidisciplinary transformation effort calling to action the Governance, Risk, and Compliance teams, along with security, auditors, and developers. The uniqueness of these checklists lies in their phase-specific design and focus on aligning security with the team's existing way of working. They align the skills required to execute security mechanisms with those of the team executing each phase. Asserting that a close alignment, is less disruptive to the team's way of working, and consequently more conducive to maintaining the delivery speed of DevSecOps. The checklists encapsulate alignment initiatives that first enhance tried and tested security processes, like data risk assessments, threat analysis and audits, keeping their effectiveness but adapting them to the speed of DevSecOps. Secondly, it uses container technologies as catalysts to streamline the integration of security controls, piggy-backing off the automated progression of containers through the pipeline, to automate the execution and testing of security controls. Providing a blueprint for organisations seeking to secure their system development approach while maintaining its speed.

FISMA and the Risk Management Framework

Download FISMA and the Risk Management Framework PDF Online Free

Author :
Publisher : Newnes
ISBN 13 : 1597496421
Total Pages : 585 pages
Book Rating : 4.5/5 (974 download)

DOWNLOAD NOW!


Book Synopsis FISMA and the Risk Management Framework by : Daniel R. Philpott

Download or read book FISMA and the Risk Management Framework written by Daniel R. Philpott and published by Newnes. This book was released on 2012-12-31 with total page 585 pages. Available in PDF, EPUB and Kindle. Book excerpt: FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. - Learn how to build a robust, near real-time risk management system and comply with FISMA - Discover the changes to FISMA compliance and beyond - Gain your systems the authorization they need

The Complete Guide to Cybersecurity Risks and Controls

Download The Complete Guide to Cybersecurity Risks and Controls PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 149874057X
Total Pages : 336 pages
Book Rating : 4.4/5 (987 download)

DOWNLOAD NOW!


Book Synopsis The Complete Guide to Cybersecurity Risks and Controls by : Anne Kohnke

Download or read book The Complete Guide to Cybersecurity Risks and Controls written by Anne Kohnke and published by CRC Press. This book was released on 2016-03-30 with total page 336 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.

Encyclopedia of Information Assurance - 4 Volume Set (Print)

Download Encyclopedia of Information Assurance - 4 Volume Set (Print) PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1351235796
Total Pages : 3366 pages
Book Rating : 4.3/5 (512 download)

DOWNLOAD NOW!


Book Synopsis Encyclopedia of Information Assurance - 4 Volume Set (Print) by : Rebecca Herold

Download or read book Encyclopedia of Information Assurance - 4 Volume Set (Print) written by Rebecca Herold and published by CRC Press. This book was released on 2010-12-22 with total page 3366 pages. Available in PDF, EPUB and Kindle. Book excerpt: Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia’s four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource: Supplies the understanding needed to help prevent the misuse of sensitive information Explains how to maintain the integrity of critical systems Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats. Also Available Online This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including:  Citation tracking and alerts  Active reference linking  Saved searches and marked lists  HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]

Risk Management Framework

Download Risk Management Framework PDF Online Free

Author :
Publisher : Newnes
ISBN 13 : 0124047238
Total Pages : 315 pages
Book Rating : 4.1/5 (24 download)

DOWNLOAD NOW!


Book Synopsis Risk Management Framework by : James Broad

Download or read book Risk Management Framework written by James Broad and published by Newnes. This book was released on 2013-07-03 with total page 315 pages. Available in PDF, EPUB and Kindle. Book excerpt: The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader's own organization. - A comprehensive case study from initiation to decommission and disposal - Detailed explanations of the complete RMF process and its linkage to the SDLC - Hands on exercises to reinforce topics - Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before

Information Security Management Handbook

Download Information Security Management Handbook PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1439833036
Total Pages : 3280 pages
Book Rating : 4.4/5 (398 download)

DOWNLOAD NOW!


Book Synopsis Information Security Management Handbook by : Harold F. Tipton

Download or read book Information Security Management Handbook written by Harold F. Tipton and published by CRC Press. This book was released on 2007-05-14 with total page 3280 pages. Available in PDF, EPUB and Kindle. Book excerpt: Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the C

Wiley CIAexcel Exam Review 2016

Download Wiley CIAexcel Exam Review 2016 PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 111924224X
Total Pages : 1102 pages
Book Rating : 4.1/5 (192 download)

DOWNLOAD NOW!


Book Synopsis Wiley CIAexcel Exam Review 2016 by : S. Rao Vallabhaneni

Download or read book Wiley CIAexcel Exam Review 2016 written by S. Rao Vallabhaneni and published by John Wiley & Sons. This book was released on 2015-11-23 with total page 1102 pages. Available in PDF, EPUB and Kindle. Book excerpt: WILEY CIAexcel EXAM REVIEW 2016 THE SELF-STUDY SUPPORT YOU NEED TO PASS THE CIA EXAM Part 3: Internal Audit Knowledge Elements Provides comprehensive coverage based on the exam syllabus, along with sample practice multiple-choice questions with answers and explanations Deals with governance and business ethics, risk management, information technology, and the global business environment Features a glossary of CIA Exam terms, a good source for candidates preparing for and answering the exam questions Assists the CIA Exam candidate in successfully preparing for the exam Based on the CIA body of knowledge developed by The Institute of Internal Auditors (IIA), Wiley CIAexcel Exam Review 2016 learning system provides a student-focused and learning-oriented experience for CIA candidates. Passing the CIA Exam on your first attempt is possible. We'd like to help. Feature section examines the topics of Governance and Business Ethics, Risk Management, Organizational Structure and Business Processes and Risks, Communications, Management and Leadership Principles, IT and Business Continuity, Financial Management, and Global Business Environment

Information Security Management

Download Information Security Management PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1439882630
Total Pages : 870 pages
Book Rating : 4.4/5 (398 download)

DOWNLOAD NOW!


Book Synopsis Information Security Management by : Bel G. Raggad

Download or read book Information Security Management written by Bel G. Raggad and published by CRC Press. This book was released on 2010-01-29 with total page 870 pages. Available in PDF, EPUB and Kindle. Book excerpt: Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that

Software Architecture in Practice

Download Software Architecture in Practice PDF Online Free

Author :
Publisher : Addison-Wesley
ISBN 13 : 013294278X
Total Pages : 680 pages
Book Rating : 4.1/5 (329 download)

DOWNLOAD NOW!


Book Synopsis Software Architecture in Practice by : Len Bass

Download or read book Software Architecture in Practice written by Len Bass and published by Addison-Wesley. This book was released on 2012-09-25 with total page 680 pages. Available in PDF, EPUB and Kindle. Book excerpt: The award-winning and highly influential Software Architecture in Practice, Third Edition, has been substantially revised to reflect the latest developments in the field. In a real-world setting, the book once again introduces the concepts and best practices of software architecture—how a software system is structured and how that system’s elements are meant to interact. Distinct from the details of implementation, algorithm, and data representation, an architecture holds the key to achieving system quality, is a reusable asset that can be applied to subsequent systems, and is crucial to a software organization’s business strategy. The authors have structured this edition around the concept of architecture influence cycles. Each cycle shows how architecture influences, and is influenced by, a particular context in which architecture plays a critical role. Contexts include technical environment, the life cycle of a project, an organization’s business profile, and the architect’s professional practices. The authors also have greatly expanded their treatment of quality attributes, which remain central to their architecture philosophy—with an entire chapter devoted to each attribute—and broadened their treatment of architectural patterns. If you design, develop, or manage large software systems (or plan to do so), you will find this book to be a valuable resource for getting up to speed on the state of the art. Totally new material covers Contexts of software architecture: technical, project, business, and professional Architecture competence: what this means both for individuals and organizations The origins of business goals and how this affects architecture Architecturally significant requirements, and how to determine them Architecture in the life cycle, including generate-and-test as a design philosophy; architecture conformance during implementation; architecture and testing; and architecture and agile development Architecture and current technologies, such as the cloud, social networks, and end-user devices

Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security and Defense Operations

Download Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security and Defense Operations PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 100065592X
Total Pages : 859 pages
Book Rating : 4.0/5 (6 download)

DOWNLOAD NOW!


Book Synopsis Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security and Defense Operations by : Anna M. Doro-on

Download or read book Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security and Defense Operations written by Anna M. Doro-on and published by CRC Press. This book was released on 2022-09-27 with total page 859 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides multifaceted components and full practical perspectives of systems engineering and risk management in security and defense operations with a focus on infrastructure and manpower control systems, missile design, space technology, satellites, intercontinental ballistic missiles, and space security. While there are many existing selections of systems engineering and risk management textbooks, there is no existing work that connects systems engineering and risk management concepts to solidify its usability in the entire security and defense actions. With this book Dr. Anna M. Doro-on rectifies the current imbalance. She provides a comprehensive overview of systems engineering and risk management before moving to deeper practical engineering principles integrated with newly developed concepts and examples based on industry and government methodologies. The chapters also cover related points including design principles for defeating and deactivating improvised explosive devices and land mines and security measures against kinds of threats. The book is designed for systems engineers in practice, political risk professionals, managers, policy makers, engineers in other engineering fields, scientists, decision makers in industry and government and to serve as a reference work in systems engineering and risk management courses with focus on security and defense operations.

Getting an Information Security Job For Dummies

Download Getting an Information Security Job For Dummies PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119002818
Total Pages : 336 pages
Book Rating : 4.1/5 (19 download)

DOWNLOAD NOW!


Book Synopsis Getting an Information Security Job For Dummies by : Peter H. Gregory

Download or read book Getting an Information Security Job For Dummies written by Peter H. Gregory and published by John Wiley & Sons. This book was released on 2015-03-09 with total page 336 pages. Available in PDF, EPUB and Kindle. Book excerpt: Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition and launch yourself into your dream job as an Information Security (IS) guru. Inside, you'll discover the fascinating history, projected future, and current applications/issues in the IS field. Next, you'll get up to speed on the general educational concepts you'll be exposed to while earning your analyst certification and the technical requirements for obtaining an IS position. Finally, learn how to set yourself up for job hunting success with trusted and supportive guidance on creating a winning resume, gaining attention with your cover letter, following up after an initial interview, and much more. Covers the certifications needed for various jobs in the Information Security field Offers guidance on writing an attention-getting resume Provides access to helpful videos, along with other online bonus materials Offers advice on branding yourself and securing your future in Information Security If you're a student, recent graduate, or professional looking to break into the field of Information Security, this hands-on, friendly guide has you covered.

Wiley Federal Government Auditing

Download Wiley Federal Government Auditing PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1118555856
Total Pages : 438 pages
Book Rating : 4.1/5 (185 download)

DOWNLOAD NOW!


Book Synopsis Wiley Federal Government Auditing by : Edward F. Kearney

Download or read book Wiley Federal Government Auditing written by Edward F. Kearney and published by John Wiley & Sons. This book was released on 2013-07-22 with total page 438 pages. Available in PDF, EPUB and Kindle. Book excerpt: The most practical, authoritative guide to Federal Government auditing Now in its second edition, Wiley Federal Government Auditing is authored by four CPAs who are partners at Kearney & Company, a CPA firm that specializes in providing auditing, accounting, and information technology services to the Federal Government. This single-source reference provides you with up-to-date information on applicable laws, regulations, and audit standards. Created for both professionals and others performing Federal Government audits, this guide condenses the abundant, complex criteria for Federal Government auditing into concise, accessible topics you'll refer to frequently and presents: An easy-to-navigate format that allows you to find needed information quickly Detailed guidance on what, why, how, and by whom Federal audits should be made Discussion on internal control over Federal financial reporting Recent developments in auditing standards Federal financial statements, budgeting, accounting, and more Coverage of the scope and work required in an audit of Federal departments and agencies Examples of Federal audits Separate chapters devoted to auditing and evaluating Federal IT systems; performance audits; procurement and contract audits; and grant audits Written in a non-technical style and complete with helpful exhibits, this guide is a "go-to" reference for government auditors, Inspectors General, public accountants, military comptrollers, legislators, state and local government auditors, budget offices, financial managers, and financial analysts. The content also applies to contractors and grantees, universities, and other nonprofits and organizations that have repeated financial dealings with the Federal Government.