This book provides concise commentary on strategic issues regarding the way internal audit is established, planned and performed. High-level issues sit alongside practical guidance to ensure the book
This guide looks at the human challenges associated with information security.It assesses the consequences of failing to meet them and – most importantly – looks at the steps organisations can take to
The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security prof
Deploying releases into production is fraught with difficultyWith so many interested constituencies, processes can go wrong in more ways than they can go right. The problems start when requirements ar
A short introduction to the key processes and stages of an asset management project as outlined in the Information Technology Infrastructure Library (ITILR).
The purpose of this pocket guide is to provide an introduction to the tools, techniques and procedures utilised within computer forensics. It is an easy to understand, introductory text, which gives a
Describes in practical detail how to carry out an information security risk assessment based on international best practice standards such as ISO/IEC 27005, NIST SP800-30 and BS7799-3.