Skip to main content

Posts

COBIT 2019 Process Assessment Template Tools

Recent posts

IT Governance: How Top Performers Manage IT Decision Rights for Superior Results, 2004

  Firms with superior IT governance have more than 25% higher profits than firms with poor governance given the same strategic objectives. These top performers have custom designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company objectives and monitors performance and accountability. Based on a study of 250 enterprises worldwide, IT Governance shows how to design and implement a system of decision rights that will transform IT from an expense to a profitable investment. Download e-book (with  Request Access ): P. Weill and J. Ross, " IT Governance: How Top Performers Manage IT Decision Rights for Superior Results " Harvard Business School Press, Boston | English | 2004 | ISBN-13: 9781591392538  | 269 pages | PDF-Scan | 26.3 MiB Download Link: https://bit.ly/ITGovWeill  | Request Access *Terms and conditions apply

Principles of Information Security, 6th Edition, 2018

Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: Principles of Information Security , Sixth Edition. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security - not just the technical control perspective. Students gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. Students review terms used in the field, a history of the discipline, and an overview of how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making it ideal for business decision-makers

Computer Security Fundamentals, 3rd Edition, 2016

Clearly explains core concepts, terminology, challenges, technologies, and skills. Covers today’s latest attacks and countermeasures. The perfect beginner’s guide for anyone interested in a computer security career. Chapter: Introduction to Computer Security Networks and the Internet Cyber Stalking, Fraud, and Abuse Denial of Service Attacks Malware Techniques Used by Hackers Industrial Espionage in Cyberspace Encryption Computer Security Software Security Policies Network Scanning and Vulnerability Scanning Cyber Terrorism and Information Warfare Cyber Detective Introduction to Forensics

Computer Security Principles and Practice, 3rd Edition, 2016

Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer or Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists. Chapter: Overview Cryptographic Tools User Authentication Access Control Database and Cloud Security Malicious Software Denial-of-Service Attacks Intrusion Detection Firewalls and Intrusion Prevention Systems Buffer Overflow Software Security Operating System Security Trusted Computing and Multilevel Security IT Security Management and Risk Assessment IT Security Controls, Plans and Procedures Physical and Infrastructure Security Human Resources Security Security Auditing Legal and Ethical Aspects Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Internet Security Protocols and Standards Internet Authenti

Principles of Incident Response and Disaster Recovery, 2nd Edition, 2014

Principles of Incident Response & Disaster Recovery, Second Edition presents methods to identify vulnerabilities within computer networks and the countermeasures that mitigate risks and damage. From market-leading content on contingency planning, to effective techniques that minimize downtime in an emergency, to curbing losses after a breach, this text is the resource needed in case of a network intrusion. Chapter: An Overview of Information Security and Risk Management Planning for Organizational Readiness Contingency Strategies for IR/DR/BC Incident Response: Planning Incident Response: Detection and Decision Making Incident Response: Organizing and Preparing the CSIRT Incident Response: Response Strategies Incident Response: Recovery and Maintenance Disaster Recovery: Preparation and Implementation Disaster Recovery: Operation and Maintenance Business Continuity Planning Crisis Management and International Standards in IR/DR/BC

Knowledge Management, 1st Edition, 2004

This seventeen chapter, brand new text presents a multi-perspective approach to Knowledge Management. It spans electrical engineering, artificial intelligence, information systems, and business. Comprehensive yet clearly and concisely written, Knowledge Management is simultaneously strong in managerial, technical, and systemic aspects of Knowledge Management, providing students with the right combination of theory, technology, and solutions. Chapter: Introducing Knowledge Management The Nature of Knowledge Knowledge Management Solutions Organizational Impacts of Knowledge Management Factors Influencing Knowledge Management Knowledge Management Assessment of an Organization Technologies to Manage Knowledge: Artificial Intelligence Preserving and Applying Human Expertise: Knowledge-Based Systems Using Past History Explicitly as Knowledge: Case-based Reasoning Systems Knowledge Elicitation – Converting Tacit Knowledge to Explicit The Computer as a Medium for Shari