You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to underst...
This pocket guide provides an introduction on how to approach the complex subject of IT governance. It describes the drivers for IT governance: why it matters, and the relationships between IT governance, risk management, information risk, project governance and compliance risk.
This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.
This important new book - 'IT Governance: Guidelines for Directors' provides directors, executives, managers and professional advisers with clear,pragmatic guidelines for ensuring that IT and the business work together for thesamestrategic objectives.
Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers change...
Learn how to integrate IT service metrics into your business and maximize their usage and effectiveness.
The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity. It provides recommendations on aligning a security programme with wider organisational objectives, successfully managing change and improving security culture.
Studies have shown that a company's share price is often linked to how well governed the company is, providing board members with a strong financial incentive to maintain good corporate governance practices. Yet what may constitute good governance will vary across different countries and companies, and there is no 'one size fits all' model of corporate governance. Corporate Governance will help you to become familiar with the principles and practice of good governance appropriate to your company, enabling you to uphold those standards that will improve your corporate reputation while providing reassurance to market regulators. For directors of companies of all shapes and sizes, this is essential reading, and will answer all your questions on what good corporate governance means for you, your company's reputation and its share price.
This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.