https://www.itgovernance.co.uk
Content Type | OA ? | PCA ? |
---|---|---|
Books (Back List, Front List) | No | Yes |
Titles start with C (31) | Information |
---|---|
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment |
Author/Editor: JULIE E. MEHAN
|
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger |
Author/Editor: JULIE E. MEHAN
|
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide |
Author/Editor: WILLIAM GAMBLE
|
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) |
Author/Editor: ALAN CALDER
|
Cyber Security: Essential principles to secure your organisation |
Author/Editor: ALAN CALDER
|
Cyber Risks for Business Professionals: A Management Guide |
Author/Editor: RUPERT KENDRICK
|
Cyber resilience: Defence-in-depth principles |
Author/Editor: ALAN CALDER
|
Cyber Essentials: A Pocket Guide |
Author/Editor: ALAN CALDER
|
Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications |
Author/Editor: ALAN CALDER
|
Coping with Unplanned Absences: A Pocket Guide |
Author/Editor: SARAH COOK
|
Controles estratégicos y operacionales de la TI |
Author/Editor: JOHN KYRIAZOGLOU
|
The Concise PRINCE2® - Principles and essential themes: Third edition, Ed. 3 |
Author/Editor: COLIN BENTLEY
|
The Concise PRINCE2®: A Pocket Guide, Ed. 2 |
Author/Editor: COLIN BENTLEY
|
A concise introduction to the NIS Directive: A pocket guide for digital service providers |
Author/Editor: ALAN CALDER
|
Computer Forensics: A Pocket Guide |
Author/Editor: NATHAN CLARKE
|
Compliance for Green IT: A Pocket Guide |
Author/Editor: ALAN CALDER
|
Compliance by Design: IT controls that work |
Author/Editor: CHONG EE
|
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning |
Author/Editor: RICHARD BINGLEY
|
Collaborative Business Design: The Fundamentals |
Author/Editor: Brian Johnson,Léon-Paul de Rouw
|
Collaborative Business Design: Improving and innovating the design of IT-driven business services |
Author/Editor: BRIAN JOHNSON,LÉON-PAUL DE ROUW
|
Coaching for High Performance: How to develop exceptional results through coaching |
Author/Editor: SARAH COOK
|
Cloud Security and Governance: Who's on your cloud? |
Author/Editor: SUMNER BLOUNT,ROB ZANELLA
|
Cloud Computing: Assessing the risks |
Author/Editor: JARED CARSTENSEN,BERNARD GOLDEN,JP MORGENTHAL
|
The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape |
Author/Editor: BARRY KOUNS ,JAKE KOUNS
|
The Chief Information Security Officer: Insights, tools and survival skills |
Author/Editor: BARRY L. KOUNS,JAKE KOUNS
|
Changing the IT Leader's Mindset: Time for revolution rather than evolution |
Author/Editor: ROBINA CHATHAM,BRIAN SUTTON
|
Changing how you manage and communicate change: Focusing on the human side of change |
Author/Editor: NAOMI KARTEN
|
Catalogs, Services and Portfolios: An ITSM success story |
Author/Editor: DANIEL McLEAN
|
The Case for ISO27001:2013, Ed. 2 |
Author/Editor: ALAN CALDER
|
The California Privacy Rights Act (CPRA) – An implementation and compliance guide |
Author/Editor: PRESTON BUKATY
|
The California Consumer Privacy Act (CCPA): An implementation guide |
Author/Editor: PRESTON BUKATY
|