IT Controls Part II: Security and Access
Chapter 16 Controlling Computer-Based Information Systems, Part II.