Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruc
This guide looks at the human challenges associated with information security.It assesses the consequences of failing to meet them and – most importantly – looks at the steps organisations can take to
In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal
A short introduction to the key processes and stages of an asset management project as outlined in the Information Technology Infrastructure Library (ITILR).
Deliver exceptional results from your IT department using Agile approaches. Agile methodologies and practices have been proven over the past two decades to increase the relevance, quality, flexibility
ITIL Lifecycle Essentials covers all of the vital material required for the entry-level ITIL Foundation Certificate, which gives candidates a comprehensive overview of the key elements, concepts and t
As organizations seek to boost revenue, cut costs and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prep
Directing the Agile Organisation uses a combination of first-hand research and in-depth case studies to offer a fresh approach to business management, applying Agile processes pioneered in the IT and
The intentions of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker are not the same. They can all cause serious problems for your organisation, however, includin
This title explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, the author cov
How IT auditors and their clients perceive each other affects the quality of their working relationships. Although most books for IT auditors acknowledge the importance of soft skills, they usually fo
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.Th
An official ITILR Licensed product, ITILR Foundation Essentials is a distillation of critical information - no waffle or padding - just exactly what you need to understand how to pass the ITIL Foundat
This pocket guide provides you with an insider’s detailed description of Accenture’s IT governance policy and details its governance structure. It will show how effective IT governance links IT strate
This pocket guide will enable managers without previous specialist knowledge to put in place an Environmental Management System to achieve compliance with the ISO14001 Standard.