Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best
In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal
Directing the Agile Organisation uses a combination of first-hand research and in-depth case studies to offer a fresh approach to business management, applying Agile processes pioneered in the IT and
As organizations seek to boost revenue, cut costs and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prep
'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing perceptions of how technology should work and newfound, bu
ISO/IEC 20000 is an important international standard for IT service providers. Implementation and certification will improve your business processes and practices and will reassure your customers that
A short introduction to the key processes and stages of an asset management project as outlined in the Information Technology Infrastructure Library (ITILR).
This guide looks at the human challenges associated with information security.It assesses the consequences of failing to meet them and – most importantly – looks at the steps organisations can take to
If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological,
Discover how to implement an effective IT governance structure for the long-term success of an extended enterpriseIT is no longer an enabler of corporate strategy, it is now the key element of corpora
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.Th
The intentions of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker are not the same. They can all cause serious problems for your organisation, however, includin
In Availability and Capacity Management in the Cloud: An ITSM narrative, Daniel McLean’s fictional IT service management practitioner, Chris, faces the challenge of integrating cloud services into an
This is the first book to provide guidance on creating an integrated system based on the three leading service management approaches: COBITR5, ISO/IEC 20000 and ITILR and to provide a unique mapping t
IT has brought many benefits to business. However, IT failures can seriously damage your ability to deliver products and services, harm your company’s reputation, and jeopardise your relationship with
This guide, updated to reflect ISO27001:2013, presents the compelling business case for implementing ISO27001 in order to protect your information assets. Ideal reading for anyone unfamiliar with the
Information is one of your organisation’s most important resources. Keeping that information secure is therefore vital to your business. This handy pocket guide is an essential overview of two key inf
Cleverly utilizes a fictional story to make the subject matter - implementation of a KPI management system - accessible and engaging for the reader. The events in the book are based on the author’s ow
ITIL Lifecycle Essentials covers all of the vital material required for the entry-level ITIL Foundation Certificate, which gives candidates a comprehensive overview of the key elements, concepts and t
How IT auditors and their clients perceive each other affects the quality of their working relationships. Although most books for IT auditors acknowledge the importance of soft skills, they usually fo
ISO22301: A Pocket Guide is designed to help you do what is necessary to satisfy the requirements of ISO22301, the latest international standard for Business Continuity Management (BCM). With the expe
Many SAP projects use waterfall methodologies, but these often run into budgeting and scheduling problems. In this unique book, Sean Robson presents ways of improving SAP implementations and offers pr
The Governance Report 2013 seeks to address the implications of the current state of the world in terms of "good governance", that is, the effective, efficient, and reliable set of legitimate institut
This title explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, the author cov
An official ITILR Licensed product, ITILR Foundation Essentials is a distillation of critical information - no waffle or padding - just exactly what you need to understand how to pass the ITIL Foundat
IT service metrics: Manage them. Measure them. Make them work for you. Measuring success is crucial, but how do we do it? How can we be sure that the IT services we offer are adding real value to our
Deliver exceptional results from your IT department using Agile approaches. Agile methodologies and practices have been proven over the past two decades to increase the relevance, quality, flexibility
Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruc
This pocket guide will enable managers without previous specialist knowledge to put in place an Environmental Management System to achieve compliance with the ISO14001 Standard.
This pocket guide provides you with an insider’s detailed description of Accenture’s IT governance policy and details its governance structure. It will show how effective IT governance links IT strate
This pocket guide explains the function of enterprise architecture, looks at the skills needed within the enterprise architecture team and presents the most common frameworks.