https://www.itgovernance.co.uk
Content Type | OA ? | PCA ? |
---|---|---|
Books (Back List, Front List) | No | Yes |
Titles (278) | Information |
---|---|
21st Century Chinese Cyberwarfare |
Author/Editor: WILLIAM T. HAGESTAD II
|
30 Key Questions that Unlock Management |
Author/Editor: BRIAN SUTTON,ROBINA CHATHAM
|
50 Top IT Project Management Challenges |
Author/Editor: PREMANAND DORAISWAMY,PREMI SHIV
|
Above the Clouds: Managing Risk in the World of Cloud Computing |
Author/Editor: KEVIN T. MCDONALD
|
Agile: An Executive Guide: Real results from IT budgets |
Author/Editor: JAMIE LYNN COOKE
|
Agile: An Executive Guide: Real results from IT budgets, Ed. 2 |
Author/Editor: JAMIE LYNN COOKE
|
Agile Governance and Audit: An overview for auditors and agile teams |
Author/Editor: CHRISTOPHER WRIGHT
|
Agile Principles Unleashed: Proven approaches for achieving real productivity gains in any organisation |
Author/Editor: JAMIE LYNN COOKE
|
Agile Productivity Unleashed: Proven approaches for achieving real productivity gains in any organization |
Author/Editor: JAMIE LYNN COOKE
|
Agile Productivity Unleashed: Proven approaches for achieving productivity gains in any organisation, Ed. 2 |
Author/Editor: JAMIE LYNN COOKE
|
Agile Project Management, Assurance and Auditing: A practical guide for auditors, reviewers and project teams |
Author/Editor: CHRISTOPHER WRIGHT
|
Agile SAP: Introducing flexibility, transparency and speed to SAP implementations |
Author/Editor: SEAN ROBSON
|
Application security in the ISO27001:2013 Environment, Ed. 2 |
Author/Editor: VINOD VASUDEVAN,ANOOP MANGLA,FIROSH UMMER,SACHIN SHETTY,SANGITA PAKALA,SIDDHARTH ANBALAHAN
|
Application security in the ISO27001 Environment |
Author/Editor: VINOD VASUDEVAN,ANOOP MANGLA,FIROSH UMMER,SACHIN SHETTY,SANGITA PAKALA,SIDDHARTH ANBALAHAN
|
Artificial Intelligence: Ethical, Social and Security Impacts for the Present and the Future |
Author/Editor: JULIE E. MEHAN
|
Artificial Intelligence: Ethical, social, and security impacts for the present and the future, Second edition |
Author/Editor: JULIE E. MEHAN
|
The Art of Cyber Security: A practical guide to winning the war on cyber crime |
Author/Editor: GARY HIBBERD
|
Assessing Information Security: Strategies, Tactics, Logic and Framewortk, Ed. 2 |
Author/Editor: A VLADIMIROV,K GAVRILENKO,A MICHAJLOWSKI
|
Assessing Information Security: Strategies, Tactics, Logic and Framework, Ed. 2 |
Author/Editor: A VLADIMIROV ,K GAVRILENKO ,A MICHAJLOWSKI
|
Assessing Information Security: Strategies, Tactics, Logic and Framework |
Author/Editor: A VLADIMIROV,K GAVRILENKO,A MICHAJLOWSKI
|
Assessing IT Projects to Ensure Successful Outcomes |
Author/Editor: KERRY R. WILLS
|
Availability and Capacity Management in the Cloud: An ITSM Narrative Account |
Author/Editor: DANIEL McLEAN
|
Breaking the Addiction to Process: An Introduction to Agile Project Management |
Author/Editor: ELIZABETH SCANLON THOMAS
|
Build a Security Culture |
Author/Editor: KAI ROER
|
Building a High-Performance Team: Proven techniques for effective team working |
Author/Editor: SARAH COOK
|
Business Continuity and the Pandemic Threat |
Author/Editor: ROBERT A. CLARK
|
Business Continuity and the Pandemic Threat - Learning from COVID-19 while preparing for the next pandemic |
Author/Editor: ROBERT A. CLARK
|
Business Continuity Management: Choosing to Survive |
Author/Editor: ABDULLAH AL HOUR
|
Business Management Controls: A guide |
Author/Editor: JOHN KYRIAZOGLOU
|
The California Consumer Privacy Act (CCPA): An implementation guide |
Author/Editor: PRESTON BUKATY
|
The California Privacy Rights Act (CPRA) – An implementation and compliance guide |
Author/Editor: PRESTON BUKATY
|
The Case for ISO27001:2013, Ed. 2 |
Author/Editor: ALAN CALDER
|
Catalogs, Services and Portfolios: An ITSM success story |
Author/Editor: DANIEL McLEAN
|
Changing how you manage and communicate change: Focusing on the human side of change |
Author/Editor: NAOMI KARTEN
|
Changing the IT Leader's Mindset: Time for revolution rather than evolution |
Author/Editor: ROBINA CHATHAM,BRIAN SUTTON
|
The Chief Information Security Officer: Insights, tools and survival skills |
Author/Editor: BARRY L. KOUNS,JAKE KOUNS
|
The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape |
Author/Editor: BARRY KOUNS ,JAKE KOUNS
|
Cloud Computing: Assessing the risks |
Author/Editor: JARED CARSTENSEN,BERNARD GOLDEN,JP MORGENTHAL
|
Cloud Security and Governance: Who's on your cloud? |
Author/Editor: SUMNER BLOUNT,ROB ZANELLA
|
Coaching for High Performance: How to develop exceptional results through coaching |
Author/Editor: SARAH COOK
|
Collaborative Business Design: Improving and innovating the design of IT-driven business services |
Author/Editor: BRIAN JOHNSON,LÉON-PAUL DE ROUW
|
Collaborative Business Design: The Fundamentals |
Author/Editor: Brian Johnson,Léon-Paul de Rouw
|
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning |
Author/Editor: RICHARD BINGLEY
|
Compliance by Design: IT controls that work |
Author/Editor: CHONG EE
|
Compliance for Green IT: A Pocket Guide |
Author/Editor: ALAN CALDER
|
Computer Forensics: A Pocket Guide |
Author/Editor: NATHAN CLARKE
|
A concise introduction to the NIS Directive: A pocket guide for digital service providers |
Author/Editor: ALAN CALDER
|
The Concise PRINCE2®: A Pocket Guide, Ed. 2 |
Author/Editor: COLIN BENTLEY
|
The Concise PRINCE2® - Principles and essential themes: Third edition, Ed. 3 |
Author/Editor: COLIN BENTLEY
|
Controles estratégicos y operacionales de la TI |
Author/Editor: JOHN KYRIAZOGLOU
|
Coping with Unplanned Absences: A Pocket Guide |
Author/Editor: SARAH COOK
|
Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications |
Author/Editor: ALAN CALDER
|
Cyber Essentials: A Pocket Guide |
Author/Editor: ALAN CALDER
|
Cyber resilience: Defence-in-depth principles |
Author/Editor: ALAN CALDER
|
Cyber Risks for Business Professionals: A Management Guide |
Author/Editor: RUPERT KENDRICK
|
Cyber Security: Essential principles to secure your organisation |
Author/Editor: ALAN CALDER
|
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) |
Author/Editor: ALAN CALDER
|
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide |
Author/Editor: WILLIAM GAMBLE
|
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger |
Author/Editor: JULIE E. MEHAN
|
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment |
Author/Editor: JULIE E. MEHAN
|
The Data Governance Imperative |
Author/Editor: STEVE SARSFIELD
|
Data Protection and the Cloud: Are the risks too great? |
Author/Editor: PAUL TICHER
|
Data Protection and the Cloud - Are you really managing the risks?: Second edition, Ed. 2 |
Author/Editor: PAUL TICHER
|
Data Protection Compliance in the UK: A Pocket Guide, Ed. 2 |
Author/Editor: ROSEMARY JAY,JENNA CLARKE
|
Data Protection vs. Freedom of Information: Access and Personal Data |
Author/Editor: PAUL TICHER
|
The Definitive Guide to IT Service Metrics |
Author/Editor: KURT McWHIRTER,TED GAUGHAN
|
The Definitive Guide to the C&A Transformation Process: The First Publication of a Comprehensive View of the C&A Transformation |
Author/Editor: JULIE E. MEHAN,WAYLON KRUSH
|
Digital Earth: Cyber threats, privacy and ethics in an age of paranoia |
Author/Editor: SARAH KATZ
|
Directing The Agile Organisation: A lean approach to business management |
Author/Editor: EVAN LEYBOURN
|
Disaster Recovery and Business Continuity 3rd edition: A Quick Guide for Small Organizations and Busy Executives |
Author/Editor: THEJENDRA B.S
|
Disaster Recovery and Business Continuity: A Quick Guide for Small Organizations and Busy Executives, Ed. 2 |
Author/Editor: THEJENDRA BS
|
DORA: A guide to the EU digital operational resilience act |
Author/Editor: ANDREW PATTISON
|
E-Discovery and the Federal Rules of Civil Procedures |
Author/Editor: BRADLEY J SCHAUFENBUEL
|
An Education in Service Management: A guide to building a successful service management career and delivering organisational success |
Author/Editor: DAVID BARROW
|
Effective Career Development: Advice for establishing an enjoyable career |
Author/Editor: SARAH COOK
|
The Effective Manager: Management skills for high performance |
Author/Editor: SARAH COOK
|
Email Security: A Pocket Guide |
Author/Editor: STEVEN FURNELL,PAUL DOWLAND
|
E-mail Security: A Pocket Guide |
Author/Editor: STEVEN FURNELL ,PAUL DOWLAND
|
Enterprise Architecture: A Pocket Guide |
Author/Editor: TOM GRAVES
|
Essential Time Management and Organisation: A Pocket Guide |
Author/Editor: SARAH COOK
|
Establishing an occupational health & safety management system based on ISO 45001 |
Author/Editor: NAEEM SADIQ
|
EU Code of Conduct for Cloud Service Providers: A guide to compliance |
Author/Editor: ALAN CALDER
|
The EU Data Protection Code of Conduct for Cloud Service Providers: A guide to compliance |
Author/Editor: ALAN CALDER
|
EU-DSGVO: Eine Kurzanleitung |
Author/Editor: ALAN CALDER
|
EU GDPR – An international guide to compliance |
Author/Editor: ALAN CALDER
|
EU GDPR A Pocket Guide |
Author/Editor: ALAN CALDER
|
EU GDPR: A Pocket Guide (European) |
Author/Editor: ALAN CALDER
|
EU GDPR - A Pocket Guide (European) second edition, Ed. 2 |
Author/Editor: ALAN CALDER
|
EU GDPR: A Pocket Guide, School's edition |
Author/Editor: ALAN CALDER
|
EU GDPR - A pocket guide, second edition, Ed. 2 |
Author/Editor: ALAN CALDER
|
EU GDPR & EU-US Privacy Shield: A Pocket Guide |
Author/Editor: ALAN CALDER
|
EU GDPR & EU-U.S. Privacy Shield: A pocket guide, second edition, Ed. 2 |
Author/Editor: ALAN CALDER
|
EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide - Second edition, Ed. 2 |
|
EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide |
|
EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition |
|
EU General Data Protection Regulation (GDPR), third edition: An Implementation and Compliance Guide, Ed. 3 |
|
Europrivacy™/®: The first European Data Protection Seal |
Author/Editor: ALICE TURLEY
|
Everything you want to know about Agile: How to get Agile results in a less-than-agile organization |
Author/Editor: JAMIE LYNN COOKE
|
Everything you want to know about Business Continuity |
Author/Editor: TONY DREWITT
|
Everything you want to know about Organisational Change |
Author/Editor: DARREN ARCANGEL,BRIAN JOHNSON
|
Exploding the Myths Surrounding ISO9000: A practical implementation guide |
Author/Editor: ANDREW W. NICHOLS
|
Fundamentals of Assurance for Lean Projects |
Author/Editor: CHRISTOPHER WRIGHT
|
Fundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors |
Author/Editor: Christopher Wright
|
Governance and Internal Controls for Cutting Edge IT |
Author/Editor: KAREN F. WORSTELL
|
Governance of Enterprise IT based on COBIT 5: A Management Guide |
Author/Editor: GEOFF HARMER
|
Governance of Enterprise IT based on COBIT®5: A Management Guide |
Author/Editor: GEOFF HARMER
|
The Governance of Green IT: The Role of Processes in Reducing Data Center Energy Requirements |
Author/Editor: GEORGE SPAFFORD
|
The Green Agenda: A Business Guide |
Author/Editor: ALAN CALDER
|
Greening the Data Center: A Pocket Guide |
Author/Editor: GEORGE SPAFFORD
|
Green IT in Practice: How one company is approaching the greening of its IT, Ed. 2 |
Author/Editor: GARY HIRD
|
The Green Office: A Business Guide |
Author/Editor: ALAN CALDER
|
A Guide to Effective Internal Management System Audits: Implementing internal audits as a risk management tool |
Author/Editor: ANDREW W. NICHOLS
|
How Cyber Security Can Protect Your Business: A guide for all stakeholders |
Author/Editor: CHRISTOPHER WRIGHT
|
How to Survive a Data Breach: A Pocket Guide |
Author/Editor: STEWART MITCHELL
|
Illustrating PRINCE2: Project management in real terms |
Author/Editor: SUSAN TUTTLE
|
Implementación de Calidad de Servicio basado en ISO/IEC 20000: Una Guía de Gestión |
Author/Editor: MICHAEL KUNAS
|
Implementierung von Service-Qualita basierend auf ISO/IEC 20000: Ein Management-Leitfaden |
Author/Editor: MICHAEL KUNAS
|
Implementing an Integrated Management System (IMS): The strategic approach |
Author/Editor: ALAN FIELD
|
Implementing ISO 9001:2015 – A practical guide to busting myths surrounding quality management systems |
Author/Editor: ANDREW W NICHOLS
|
Implementing Service Quality based on ISO/IEC 20000: A Management Guide, Ed. 3 |
Author/Editor: MICHAEL KUNAS
|
Information Security A Practical Guide: Bridging the gap between IT and management |
Author/Editor: TOM MOONEY
|
Information Security Breaches: Avoidance and Treatment based on ISO27001, Ed. 2 |
Author/Editor: MICHAEL KRAUSZ
|
Information Security Breaches: Avoidance and Treatment based on ISO27001 |
Author/Editor: MICHAEL KRAUSZ
|
Information Security Law: The Emerging Standard for Corporate Compliance |
Author/Editor: THOMAS J. SMEDINGHOFF
|
Information Security Risk Management for ISO 27001/ISO 27002, third edition, Ed. 3 |
Author/Editor: ALAN CALDER,STEVE G WATKINS
|
Information Security Risk Management for ISO27001/ISO27002 |
Author/Editor: ALAN CALDER,STEVE G WATKINS
|
In Hindsight: A compendium of Business Continuity case studies |
Author/Editor: ROBERT A CLARK
|
I nove passi per il successo: Compendio per l’attuazione della norma ISO 27001:2013 |
Author/Editor: ALAN CALDER
|
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within |
Author/Editor: JULIE E. MEHAN
|
The Insider Threat: Combatting the Enemy Within |
Author/Editor: CLIVE BLACKWELL
|
Integrated Measurement - KPIs and Metrics for ITSM: A narrative account |
Author/Editor: DANIEL McLEAN
|
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things |
Author/Editor: ALAN FIELD
|
An Introduction to Hacking and Crimeware: A Pocket Guide |
Author/Editor: VICTORIA LOEWENGART
|
An Introduction to Information Security and ISO27001:2013: A Pocket Guide, Ed. 2 |
Author/Editor: STEVE G WATKINS
|
ISO14001 Step by Step: A practical guide |
Author/Editor: NAEEM SADIQ,ASIF HAYAT KHAN
|
ISO 14001 Step by Step - A practical guide: Second edition, Ed. 2 |
Author/Editor: NAEEM SADIQ,ASIF HAYAT KHAN
|
ISO19770-1:2012 SAM Process Guidance: A kick-start to your SAM programme |
Author/Editor: RORY CANAVAN
|
ISO22301: 2019 - An introduction to a business continuity management system (BCMS) |
Author/Editor: ALAN CALDER
|
ISO22301: A Pocket Guide |
Author/Editor: TONY DREWITT
|
ISO27001:2013 Assessments Without Tears, Ed. 2 |
Author/Editor: STEVE G WATKINS
|
ISO 27001 controls – A guide to implementing and auditing |
Author/Editor: BRIDGET KENYON
|
ISO 27001 Controls – A guide to implementing and auditing, Second edition, Ed. 2 |
Author/Editor: BRIDGET KENYON
|
ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment, Ed. 3 |
Author/Editor: BRIAN HONAN
|
ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment, Ed. 3 |
Author/Editor: BRIAN HONAN
|
ISO27001 in a Windows Environment: The best practice implementation handbook for a Microsoft Windows environment, Ed. 3 |
Author/Editor: BRIAN HONAN
|
ISO27001/ISO27002:2013: A Pocket Guide |
Author/Editor: ALAN CALDER
|
ISO 27001/ISO 27002: A guide to information security management systems |
Author/Editor: ALAN CALDER
|
ISO27001 / ISO27002: A Pocket Guide, Ed. 2 |
Author/Editor: ALAN CALDER
|
ISO27001/ISO27002: Ein Taschenführer |
Author/Editor: ALAN CALDER
|
ISO27001/ISO27002: Guida tascabile |
Author/Editor: ALAN CALDER
|
ISO27001/ISO27002: Una guía de bolsillo |
Author/Editor: ALAN CALDER
|
ISO27001/ISO27002: Un guide de poche |
Author/Editor: ALAN CALDER
|
ISO 37001: An Introduction to Anti-Bribery Management Systems |
Author/Editor: ALAN FIELD
|
ISO 50001: A strategic guide to establishing an energy management system |
Author/Editor: ALAN FIELD
|
ISO 9001: A Pocket Guide |
Author/Editor: Steve Watkins,Nick Orchiston
|
ISO/IEC 20000: An Introduction to the global standard for service management, Ed. 2 |
Author/Editor: DAVID CLIFFORD
|
ISO/IEC 27001:2022: An introduction to information security and the ISMS standard |
Author/Editor: STEVE G WATKINS
|
ISO/IEC 27701:2019: An introduction to privacy information management |
Author/Editor: ALAN SHIPMAN,STEVE WATKINS
|
ISO/IEC 38500: A pocket guide, second edition |
Author/Editor: ALAN CALDER
|
ISO/IEC 38500: The IT Governance Standard |
Author/Editor: ALAN CALDER
|
IT Asset Management: A Pocket Survival Guide |
Author/Editor: MARTYN HOBBS
|
IT for Business (IT4B): From Genesis to Revolution, a business and IT approach to digital transformation |
Author/Editor: BRIAN JOHNSON,WALTER ZONDERVAN
|
IT Governance: A Pocket Guide |
Author/Editor: ALAN CALDER
|
IT Governance: Guidelines for Directors |
Author/Editor: ALAN CALDER
|
IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT |
Author/Editor: ALAN CALDER,STEVE MOIR
|
IT Governance Today: A Practitioners Handbook |
Author/Editor: ALAN CALDER
|
IT Governance to Drive High Performance: Lessons from Accenture |
Author/Editor: ROBERT E. KRESS
|
ITIL® 4 Create, Deliver and Support (CDS): Your companion to the ITIL 4 Managing Professional CDS certification |
Author/Editor: CLAIRE AGUTTER
|
ITIL 4 Digital and IT Strategy (DITS): Your companion to the ITIL 4 Strategic Leader DITS certification |
Author/Editor: CLAIRE AGUTTER
|
ITIL® 4 Direct, Plan and Improve (DPI): Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI certification |
Author/Editor: CLAIRE AGUTTER
|
ITIL® 4 Drive Stakeholder Value (DSV): Your companion to the ITIL 4 Managing Professional DSV certification |
Author/Editor: CLAIRE AGUTTER
|
ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond, second edition, Ed. 2 |
Author/Editor: CLAIRE AGUTTER
|
ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond |
Author/Editor: CLAIRE AGUTTER
|
ITIL® 4 High-velocity IT (HVIT): Your companion to the ITIL 4 Managing Professional HVIT certification |
Author/Editor: CLAIRE AGUTTER
|
ITIL and Organizational Change |
Author/Editor: PAMELA ERSKINE
|
ITIL Foundation Essentials ITIL 4 Edition - The ultimate revision guide, second edition, Ed. 2 |
Author/Editor: CLAIRE AGUTTER
|
ITIL® Foundation Essentials – ITIL 4 Edition: The ultimate revision guide, Ed. 2 |
Author/Editor: CLAIRE AGUTTER
|
ITIL Foundation Essentials: The exam facts you need |
Author/Editor: CLAIRE AGUTTER
|
ITIL Lifecycle Essentials: Your essential guide for the ITIL Foundation exam and beyond |
Author/Editor: CLAIRE AGUTTER
|
IT Induction and Information Security Awareness |
Author/Editor: VALERIE MADDOCK
|
IT Outsourcing Contracts: A Legal and Practical Guide |
Author/Editor: JIMMY DESAI
|
IT Project Management: 30 steps to success |
Author/Editor: PREMANAND DORAISWAMY
|
IT Regulatory Compliance in North America |
Author/Editor: ALAN CALDER
|
IT Regulatory Compliance in the UK |
Author/Editor: ALAN CALDER
|
It's All About Relationships: What ITIL® doesn't tell you |
Author/Editor: S. D. Van Hove,Kathy S. Mills
|
The ITSM Iron Triangle: Incidents, changes and problems |
Author/Editor: DANIEL McLEAN
|
IT Strategic and Operational Controls |
Author/Editor: JOHN KYRIAZOGLOU
|
Leading for Success: Unleash your leadership potential to achieve extraordinary results |
Author/Editor: SARAH COOK
|
Lessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure |
Author/Editor: TOOMAS VIIRA
|
Making a Success of Managing and Working Remotely |
Author/Editor: SARAH COOK
|
A Manager's Guide to ISO22301: A practical guide to developing and implementing a business continuity management system |
Author/Editor: TONY DREWITT
|
Managing Business Transformation: A Practical Guide |
Author/Editor: MELANIE FRANKLIN
|
Managing in a Service-Focused World: I, team, stewards and marketplace |
Author/Editor: ROGER K. WILLIAMS
|
Managing Information Risk: A Director's Guide |
Author/Editor: STEWART MITCHELL
|
Managing Information Security Breaches: Studies from real life, Ed. 2 |
Author/Editor: MICHAEL KRAUSZ
|
Managing Information Security Breaches: Studies from Real Life |
Author/Editor: MICHAEL KRAUSZ
|
Managing IT in a Downturn: A Pocket Guide |
Author/Editor: STEWART MITCHELL
|
Mastering Effective Influencing Skills for Win-Win Outcomes: A practical guide |
Author/Editor: SARAH COOK
|
Measuring your IT: Identifying the metrics that matter |
Author/Editor: JOHN STEWART
|
Mobile Security: A Pocket Guide |
Author/Editor: STEVEN FURNELL
|
Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services |
Author/Editor: ALAN CALDER
|
Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers |
Author/Editor: ALAN CALDER
|
Neuf étapes vers le succès: Un aperçu de la mise en œuvre de la norme ISO 27001:2013 |
Author/Editor: ALAN CALDER
|
Neun Schritte zum Erfolg: Ein Überblick zur Implementierung der Norm ISO 27001:2013 |
Author/Editor: ALAN CALDER
|
Nine Steps to Success: An ISO27001:2013 Implementation Overview, Ed. 3 |
Author/Editor: ALAN CALDER
|
Nine Steps to Success: An ISO27001:2013 Implementation Overview, Ed. 3 |
Author/Editor: ALAN CALDER
|
Nine Steps to Success: An ISO 27001:2022 Implementation Overview |
Author/Editor: ALAN CALDER
|
Nine Steps to Success: An ISO 27001 Implementation Overview, North American edition |
Author/Editor: ALAN CALDER
|
Nine Steps to Success: North American edition: An ISO 27001 Implementation Overview |
Author/Editor: ALAN CALDER
|
NIST Cybersecurity Framework: A pocket guide |
Author/Editor: Alan Calder
|
No One of Us is as Strong as All of Us: Services, catalogs and portfolios |
Author/Editor: DANIEL McLEAN
|
Nueve pasos para el éxito: Una visión de conjunto para la aplicación de la ISO 27001:2013 |
Author/Editor: ALAN CALDER
|
OHSAS 18001 Step by Step: A Practical Guide |
Author/Editor: NAEEM SADIQ
|
Once more unto the Breach: Managing information security in an uncertain world |
Author/Editor: ANDREA C SIMMONS
|
Once more unto the Breach: Managing information security in an uncertain world, Ed. 2 |
Author/Editor: ANDREA C SIMMONS
|
Outsourcing IT: A governance guide |
Author/Editor: RUPERT KENDRICK
|
PCI DSS: A Pocket Guide - 3rd edition |
Author/Editor: ALAN CALDER,GERAINT WILLIAMS
|
PCI DSS: A Pocket Guide, Ed. 2 |
Author/Editor: ALAN CALDER,NICKI CARTER
|
PCI DSS: A Pocket Guide, Ed. 5 |
Author/Editor: ALAN CALDER ,GERAINT WILLIAMS
|
PCI DSS: A Pocket Guide, fifth edition, Ed. 5 |
Author/Editor: ALAN CALDER,GERAINT WILLIAMS
|
PCI DSS: A Pocket Guide, fourth edition, Ed. 4 |
Author/Editor: ALAN CALDER,GERAINT WILLIAMS
|
PCI DSS: A pocket guide, sixth edition, Ed. 6 |
Author/Editor: ALAN CALDER,GERAINT WILLIAMS
|
PCI DSS: A Practical Guide to Implementing and Maintaining Compliance, Ed. 3 |
Author/Editor: STEVE WRIGHT
|
PCI DSS Version 4.0: A guide to the payment card industry data security standard |
Author/Editor: STEPHEN HANCOCK
|
Penetration Testing: Protecting Networks and Systems |
Author/Editor: KEVIN M. HENRY
|
Penetration Testing Services Procurement Guide |
Author/Editor: CREST
|
The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team |
Author/Editor: JAMIE LYNN COOKE
|
The Power of the Agile Business Analyst, second edition: 30 surprising ways a business analyst can add value to your Agile development team, Ed. 2 |
Author/Editor: JAMIE LYNN COOKE
|
Practical IT Service Management: A Concise Guide for Busy Executives |
Author/Editor: Thejendra BS
|
Practical IT Service Management: A concise guide for busy executives |
Author/Editor: THEJENDRA B.S
|
Pragmatic Application of Service Management: The Five Anchor Approach, Ed. 2 |
Author/Editor: S. D. VAN HOVE,MARK THOMAS
|
Pragmatic Application of Service Management: The Five Anchor Approach |
Author/Editor: S. D. VAN HOVE,MARK THOMAS
|
Presentation Skills for Technical Professionals: Achieving Excellence |
Author/Editor: NAOMI KARTEN
|
PRINCE2 Agile An Implementation Pocket Guide: Step-by-step advice for every project type |
Author/Editor: JAMIE LYNN COOKE
|
The PRINCE2 Agile® Practical Implementation Guide – Step-by-step advice for every project type, Second edition |
Author/Editor: JAMIE LYNN COOKE
|
PRINCE2 in Action: Project management in real terms |
Author/Editor: SUSAN TUTTLE
|
Procuring Penetration Testing Services |
Author/Editor: CREST
|
Project Governance: The Essentials |
Author/Editor: ROD BEECHAM
|
The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour |
Author/Editor: LERON ZINATULLIN
|
The Quantum Age of IT: Why everything you know about IT is about to change |
Author/Editor: CHARLES ARAUJO
|
The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks |
Author/Editor: ALAN CALDER
|
Reglamento General de Protección de Datos (RGPD) de la UE: Una guía de bolsillo |
Author/Editor: ALAN CALDER
|
Release and Deployment: An ITSM narrative |
Author/Editor: DANIEL McLEAN
|
Resilient Thinking: Protecting organisations in the 21st century, Second edition |
Author/Editor: PHILLIP WOOD
|
Resilient Thinking: Protecting Organisations in the 21st Century |
Author/Editor: PHILLIP WOOD
|
Reviewing IT in Due Diligence: Are you buying an IT asset or liability |
Author/Editor: CHRISTOPHER WRIGHT,BRYAN ALTIMAS
|
RGPD UE: Guide de poche |
Author/Editor: ALAN CALDER
|
Right First Time: Buying and integrating advanced technology for project success |
Author/Editor: PETER SAMMONS
|
Risk Assessment for Asset Owners |
Author/Editor: ALAN CALDER,STEVE G WATKINS
|
Risk Management and ISO 31000: A pocket guide |
Author/Editor: ALAN FIELD
|
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT, Ed. 2 |
Author/Editor: ROBERT E. KRESS
|
Securing Cloud Services: A pragmatic approach, second edition, Ed. 2 |
Author/Editor: LEE NEWCOMBE
|
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud |
Author/Editor: LEE NEWCOMBE
|
Securing Cloud Services - A pragmatic guide: Second edition, Ed. 2 |
Author/Editor: LEE NEWCOMBE
|
The Security Consultant's Handbook |
Author/Editor: RICHARD BINGLEY
|
Security in the Digital World |
Author/Editor: GRAHAM DAY
|
Security Testing Handbook for Banking Applications |
Author/Editor: ARVIND DORAISWAMY,SANGITA PAKALA,NILESH KAPOOR,PRASHANT VERMA,PRAVEEN SINGH,RAGHU NAIR,SHALINI GUPTA
|
Security: The Human Factor |
Author/Editor: PAUL KEARNEY
|
Selection Management: For Systems and Services |
Author/Editor: JACQUIE WAKEFORD
|
Selling Information Security to the Board: A Primer |
Author/Editor: ALAN CALDER
|
Selling Information Security to the Board: A Primer, Ed. 2 |
Author/Editor: ALAN CALDER
|
The Service Desk Handbook ??? A guide to service desk implementation, management and support |
Author/Editor: SANJAY NAIR
|
Service Integration and Management (SIAM™) Foundation Body of Knowledge (BoK), Second edition |
Author/Editor: CLAIRE AGUTTER
|
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition |
Author/Editor: MICHELLE MAJOR-GOLDSMITH ,SIMON DORST ,CLAIRE AGUTTER
|
Service Level Agreements: A legal and practical guide |
Author/Editor: JIMMY DESAI
|
SIAM/MSI: An Introduction to Service Integration and Management/ Multi-Sourcing Integration for IT Service Management |
Author/Editor: DAVID CLIFFORD
|
Software Life Cycle Management Standards: Real-world Scenarios and Solutions for Savings |
Author/Editor: DAVID WRIGHT
|
SWANSON on Internal Auditing: Raising the Bar |
Author/Editor: DAN SWANSON
|
The Tao of Open Source Intelligence |
Author/Editor: STEWART K. BERTRAM
|
Ten Steps to ITSM Success: A Practitioner’s Guide to Enterprise IT Transformation |
Author/Editor: ANGELO ESPOSITO,TIMOTHY ROGERS
|
The True Cost of Information Security Breaches and Cyber Crime |
Author/Editor: MICHAEL KRAUSZ,JOHN WALKER
|
Turning Heads and Changing Minds: Transcending IT Auditor Archetypes |
Author/Editor: CHONG EE
|
Two-Factor Authentication |
Author/Editor: MARK STANISLAV
|
UE-RGDP: Guida tascabile |
Author/Editor: ALAN CALDER
|
The Universal Service Desk (USD): Implementing, controlling and improving service delivery |
Author/Editor: BRIAN JOHNSON,LÉON-PAUL DE ROUW
|
Validating Your Business Continuity Plan |
Author/Editor: ROBERT A. CLARK
|
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely |
Author/Editor: Lori Mac Vittie
|
Well-being in the workplace: A guide to resilience for individuals and teams |
Author/Editor: SARAH COOK
|