New and Noteworthy

Online Shop | Books for your Business | IT Governance Publications |  New and Noteworthy

Essential Information Security


In Paperback Format
Essential Information Security

£34.00
ISBN
9789087537364
Author
John Wieland & Cathy Pitt
Published by
Van Haren Publishing
Publication Date
12 September 2013
Format
Paperback
Extent
240 pages
Language
English

This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private data private, making sure only the people who are authorized have access to the data, making sure your data is always there, always the way you left it, keeping your secrets secret, making sure you trust your sources, and comply with government and industry regulations and standards. It is about managing your risks and keeping the business going when it all goes south.

Every new security practitioner should start with this book, which covers the most relevant topics like cloud security, mobile device security and network security and provides a comprehensive overview of what is important in information security. Processes, training strategy, policies, contingency plans, risk management and effectiveness of tools are all extensively discussed. 


Business Continuity and Disaster Recovery Planning for IT Professionals


In Paperback Format
Business Continuity and Disaster Recovery Planning for IT Professionals

£42.99
ISBN
9780124105263
Author
Susan Snedaker
Published by
Syngress
Publication Date
8 November 2013
Edition
2nd Edition
Format
Paperback
Extent
620 pages

In this essential guide by Susan Snedaker, discover the basics of business continuity and disaster recovery planning for IT professionals. This guide:
  • Includes complete coverage of three types of disaster: natural disasters, accidental disasters, and human-caused disasters
  • Comes with checklists for disaster planning and readiness for IT infrastructure, enterprise applications, data centres and standalone machines
  • Gives guidance on how to develop alternate physical locations as a backup should disaster strike
  • Shares clear advice on emergency readiness and response
  • Covers up-to-date legal advice on data loss following a disaster or data breach


Business Continuity and Disaster Recovery Planning for IT Professionals, Second Edition is one of the most up-to-date guides to planning and risk management techniques for business continuity and disaster recovery for IT professionals.  


Total Information Risk Management


In Paperback Format
Total Information Risk Management

£30.99
ISBN
9780124055476
Author
Alexander Borek, Ajith Kumar Parlikad, Jela Webb, Philip Woodall
Published by
Morgan Kaufmann
Publication Date
1 November 2013
Format
Paperback
Extent
316 pages

In this book you will discover how to manage the issues associated with data or information quality. With organisations looking to make more effective use of their data and information, the risks posed from this use are becoming greater by the day.

Risks posed to an organisation by poor data and information quality come in many forms, including the following:
  • Strategic
  • Operational
  • Financial
  • Compliance
  • Environmental
  • Societal

By reading this book and understanding the information within you will grasp how data and information quality affects your organisation. This book has been written as is in direct response to the new challenges that all managers have to face in the information age.

The process detailed in this book will help your organisation to understand the 'pain points' regarding poor data and information quality in order to be able to concentrate on problems that have a high impact on core business objectives. Total Information Risk Management provides you with all fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively. 


Big Data


In Paperback Format
Big Data
Understanding How Data Powers Big Business

£26.99
ISBN
9781118739570
Author
Bill Schmarzo
Published by
John Wiley
Publication Date
14 October 2013
Format
Paperback
Extent
240 pages

In Big Data: Understanding How Data Powers Big Business find out the new phenomenon of big data can be leveraged to deliver real business value. By reading this book you will establish how social media analytics, Web-tracking and other technologies can help you to acquire and manage large amounts of data that enable you to gain an understanding of your customers and how and why they buy your products.

This guide is full of pragmatic advice and real-world examples that make the information within easy to employ and use. By using this guide you will understand how and when your organisation can take advantage of big data. 


Cyber Crime Security and Digital Intelligence


In Hardback Format
Cyber Crime Security and Digital Intelligence

£65.00
ISBN
9781409454496
Author
Mark Johnson
Published by
Gower
Publication Date
15 Aug 2013
Format
Hardback
Extent
300 pages

Cyber Crime, Security and Digital Intelligence is a straightforward, plain-English guide to cyber crime, security and digital intelligence. Written as much for non-technical managers as it is for technical managers, this book explores:

  • Countermeasures
  • Penetration testing
  • Best practice principles
  • Cyber conflict
  • And future challenges

Furthermore, this title explores the risks posed by Web 2.0 and discusses the real questions facing policy makers. Coverage is provided on the pros and cons of open source data. In the chapter titled Digital Intelligence you will find pragmatic information on how to conduct digital investigations.

Cyber Crime Security and Digital Intelligence.....
  • Is a plain-English, no-nonsense guide to cyber crime, security and digital intelligence. This being the case, it makes the information within the book a lot more pragmatic and easier to use meaning you can get started with making your organisation resilient much quicker!
  • Offers insights posed by the world of Web 2.0 and open source data, lifting the lid off future threats that may surface from cyberspace, keeping you up to date with the latest developments means you can better protect your organisation!
  • Includes a chapter on undertaking digital investigations. With this information you can investigate issues that arise and look for effective ways to solve them i.e. plug vulnerabilities.
 


CyberWar, CyberTerror, CyberCrime


In Paperback Format
CyberWar, CyberTerror, CyberCrime

£39.95
ISBN
9781905356478
Author
Dr Julie Mehan
Published by
IT Governance Publishing
Publication Date
17 Apr 2008
Format
Paperback
Extent
280 pages

CyberTerrorism, CyberCrime and CyberAttacks pose a serious risk to national, individual and corporate security, concludes Dr Mehan. The weapons of the CyberTerrorist or CyberCriminal are subtle, insidious, difficult to trace, low cost and easily deployed globally. Vital organizations on which we all depend are potentially vulnerable to this kind of attack, particularly financial, defense, telecommunications and energy networks, and no-one can afford to ignore the level of threat. CyberWar, CyberTerror, CyberCrime is a valuable tool for CIOs and IT professionals in assessing how to utilise the best standards and practices to secure their information systems against attack.

In the course of 280 pages, CyberWar, CyberTerror, CyberCrime makes a convincing case for the application of international standards and practices as the key counter-measure to the global threat of CyberAttacks. The book also provides a useful glossary of wider reading and current international standards. 


Cyber Risks for Business Professionals


In Paperback Format
Cyber Risks for Business Professionals
A Management Guide

£29.95
ISBN
9781849280921
Author
Rupert Kendrick
Published by
IT Governance Publishing
Publication Date
28 Oct 2010
Format
Paperback
Extent
316 pages

Internet technologies have revolutionised the way that business is conducted. However, these innovations expose your business to various risks. Inadequate security can lead to the theft of customer data and, in the event of technological failure or a cyberattack, your business could lose its ability to function altogether. An effective risk management strategy is, therefore, vital to your company’s survival.

Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management. It provides a breakdown of the main risks involved and shows you how to manage them. Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject.

Drawing on interviews with experts from Clifford Chance, Capgemini and Morgan Stanley amongst others, the book examines the operational and technological risks alongside the legal and compliance issues. This book will be invaluable to lawyers and accountants, as well as to company directors and business professionals.

Benefits to business include:
  • Understand and manage the technological risks
    This book looks at the security issues surrounding Cloud computing, and highlights the problems that have arisen as a result of the use of laptop computers and memory sticks for remote working. Implementing a risk management framework will offer reassurance to your existing customers and improve your chances of winning new business.
  • Familiarise yourself with the legal issues
    You need to be aware of the laws that govern your activities when you do business online. The author offers you a guide to the most important aspects of IT law, and outlines the implications of recent legislation. The author also looks at the compliance requirements of PCI DSS (the Payment Card Industry Data Security Standard).
  • Control employee use of Web 2.0 technologies
    While sites such as Facebook and LinkedIn help people to develop business contacts, employee misuse of social networking sites also causes problems, ranging from damage to the companys reputation to breaches of commercial confidentiality. This book offers advice on the right policy to adopt to ensure your staff use Web 2.0 technologies responsibly.
  • Use technology to address the risks
    This book introduces you to IT solutions that you can deploy to improve your information security, such as encryption and digital watermarking. It also looks at how you can monitor and control e-mail to prevent the leaking of sensitive information.

 


An Introduction to Hacking & Crimeware


In Paperback Format
An Introduction to Hacking & Crimeware
A Pocket Guide

£9.95
ISBN
9781849283281
Author
Victoria Loewengart
Published by
IT Governance Publishing
Publication Date
19 Jan 2012
Format
Paperback
Extent
60 pages

Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits to create malware are now readily available to anyone wishing to defraud and do damage. For your business to survive and thrive, it is vital to stay informed about the threats and the risks, and arm yourself against them.

An Introduction to Hacking Crimeware is a comprehensive guide to the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.

In this pocket guide, the author:
  • defines exactly what crimeware is both intentional and unintentional and gives specific, up-to-date examples to help you identify the risks and protect your business
  • explores the increasing use of COTS tools as hacking tools, exposing the enemys tactics gives practical suggestions as to how you can fight back
  • provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.
 


Bring Your Own Devices (BYOD) Survival Guide


In Hardback Format
Bring Your Own Devices (BYOD) Survival Guide

£49.99
ISBN
9781466565036
Author
Jessica Keyes
Published by
Auerbach Publications
Publication Date
26 Mar 2013
Format
Hardback
Extent
451 pages

In Bring Your Own Device (BYOD) Survival Guide you learn about the fundamentals of this new phenomenon sweeping through the business world. The guide examines business aspects of BYOD and bring your own technology (BYOT) as it is sometimes known.

Furthermore, the guide details the technical considerations that need to be considered, including selection, connectivity, training, support and security. Also included is extensive coverage of best practice for BYOD.

The book is specifically aimed at small-medium sized enterprises that need to cope with this new way of working. Topics covered in the book include:
  • Content and data management
  • Risk assessment
  • Performance measurement
  • Management
  • Configuration management

An added benefit of this book is that it includes a quick start guide that provide tips for assessing costs, cloud integration and legal issues. Appendices are included in the book that cover everything from security settings for Apple iOS devices to a sample employee mobile device agreement. 


Online Shop | Books for your Business | IT Governance Publications |  New and Noteworthy

Civil Service Yearbook
The new Civil Service Yearbook 53rd Edition - Pre-order now.
Civil Service Yearbook 52nd Edition available now
Buy The Civil Service Yearbook
IMDG Code
2014 Edition
The new IMDG Code is in stock now.
IMDG Code 2014 available now
Buy The IMDG code
New Products

The Report of the Iraq Inquiry

Police Workforce, England and Wales, 30 September 2016

European Pharmacopoeia 9th Edition Book Subscription 2017 (9.0, 9.1 and 9.2)

Fire Statistics: Great Britain, 2014-2015

Non-domestic rating: Business Floorspace 2016

The Annual Abstract of Statistics for Benefits, and Indices of Prices and Earnings 2016 Edition

Annual Bus Statistics Light Rail and Tram Statistics Blue Badge Scheme Statistics 2015/16

Bookmark us via QR code
Worldwide Delivery
Secure Payment
Secure Payment
Best Sellers

Dorema U-tabs for ADR/RID 2017

UN ADR 2017 (Books) Two Volume Set

IMDG Code 2016 Edition (inc Amdt 38-16) Book (2 vols)

HSE Approved Codes of Practice - Six Pack (6 Pack) Pack of 6 Books

IATA Dangerous Goods Regulations (DGR) 58th Edition 2017 (Regular Bound)

IMDG Code 2014 Edition (inc Amdt 37-14) Book (2 vols)