https://www.itgovernance.co.uk

Content Type OA ? PCA ?
Books (Back List, Front List) No Yes

Request a holdings comparison

Portico provides a free holdings comparison service to compare a library’s journal or book holdings to the Portico archive.

Show:
 
Titles start with C (31) Information
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment
Author/Editor: JULIE E. MEHAN
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger
Author/Editor: JULIE E. MEHAN
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide
Author/Editor: WILLIAM GAMBLE
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF)
Author/Editor: ALAN CALDER
Cyber Security: Essential principles to secure your organisation
Author/Editor: ALAN CALDER
Cyber Risks for Business Professionals: A Management Guide
Author/Editor: RUPERT KENDRICK
Cyber resilience: Defence-in-depth principles
Author/Editor: ALAN CALDER
Cyber Essentials: A Pocket Guide
Author/Editor: ALAN CALDER
Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications
Author/Editor: ALAN CALDER
Coping with Unplanned Absences: A Pocket Guide
Author/Editor: SARAH COOK
Controles estratégicos y operacionales de la TI
Author/Editor: JOHN KYRIAZOGLOU
The Concise PRINCE2® - Principles and essential themes: Third edition, Ed. 3
Author/Editor: COLIN BENTLEY
The Concise PRINCE2®: A Pocket Guide, Ed. 2
Author/Editor: COLIN BENTLEY
A concise introduction to the NIS Directive: A pocket guide for digital service providers
Author/Editor: ALAN CALDER
Computer Forensics: A Pocket Guide
Author/Editor: NATHAN CLARKE
Compliance for Green IT: A Pocket Guide
Author/Editor: ALAN CALDER
Compliance by Design: IT controls that work
Author/Editor: CHONG EE
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning
Author/Editor: RICHARD BINGLEY
Collaborative Business Design: The Fundamentals
Author/Editor: Brian Johnson,Léon-Paul de Rouw
Collaborative Business Design: Improving and innovating the design of IT-driven business services
Author/Editor: BRIAN JOHNSON,LÉON-PAUL DE ROUW
Coaching for High Performance: How to develop exceptional results through coaching
Author/Editor: SARAH COOK
Cloud Security and Governance: Who's on your cloud?
Author/Editor: SUMNER BLOUNT,ROB ZANELLA
Cloud Computing: Assessing the risks
Author/Editor: JARED CARSTENSEN,BERNARD GOLDEN,JP MORGENTHAL
The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape
Author/Editor: BARRY KOUNS ,JAKE KOUNS
The Chief Information Security Officer: Insights, tools and survival skills
Author/Editor: BARRY L. KOUNS,JAKE KOUNS
Changing the IT Leader's Mindset: Time for revolution rather than evolution
Author/Editor: ROBINA CHATHAM,BRIAN SUTTON
Changing how you manage and communicate change: Focusing on the human side of change
Author/Editor: NAOMI KARTEN
Catalogs, Services and Portfolios: An ITSM success story
Author/Editor: DANIEL McLEAN
The Case for ISO27001:2013, Ed. 2
Author/Editor: ALAN CALDER
The California Privacy Rights Act (CPRA) – An implementation and compliance guide
Author/Editor: PRESTON BUKATY
The California Consumer Privacy Act (CCPA): An implementation guide
Author/Editor: PRESTON BUKATY