ISO22301: A Pocket Guide is designed to help you do what is necessary to satisfy the requirements of ISO22301, the latest international standard for Business Continuity Management (BCM). With the expe
ISO/IEC 20000 is an important international standard for IT service providers. Implementation and certification will improve your business processes and practices and will reassure your customers that
ITIL Lifecycle Essentials covers all of the vital material required for the entry-level ITIL Foundation Certificate, which gives candidates a comprehensive overview of the key elements, concepts and t
IT service metrics: Manage them. Measure them. Make them work for you. Measuring success is crucial, but how do we do it? How can we be sure that the IT services we offer are adding real value to our
Many SAP projects use waterfall methodologies, but these often run into budgeting and scheduling problems. In this unique book, Sean Robson presents ways of improving SAP implementations and offers pr
If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological,
Deliver exceptional results from your IT department using Agile approaches. Agile methodologies and practices have been proven over the past two decades to increase the relevance, quality, flexibility
In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal
Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruc
This title explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, the author cov
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.Th
The intentions of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker are not the same. They can all cause serious problems for your organisation, however, includin
'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing perceptions of how technology should work and newfound, bu
As organizations seek to boost revenue, cut costs and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prep
Cleverly utilizes a fictional story to make the subject matter - implementation of a KPI management system - accessible and engaging for the reader. The events in the book are based on the author’s ow
In Availability and Capacity Management in the Cloud: An ITSM narrative, Daniel McLean’s fictional IT service management practitioner, Chris, faces the challenge of integrating cloud services into an
This pocket guide will enable managers without previous specialist knowledge to put in place an Environmental Management System to achieve compliance with the ISO14001 Standard.
How IT auditors and their clients perceive each other affects the quality of their working relationships. Although most books for IT auditors acknowledge the importance of soft skills, they usually fo