-
ISO22301: 2019 - An introduction to a business continuity management system (BCMS)
Author Alan Calder
Understand the basics of business continuity and ISO 22301:2019 with this concise pocket guide, which will help you ensure your organisation can continue to operate in the event of a disruption.
Release Date 2020/06 -
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition has been updated to reflect changes to the market and is the official guide for the EXIN SIAM™ Professional certification.Prepare for your SIAM™ Professional exam and understand how SIAM can benefit your .... -
Risk Management and ISO 31000 - A pocket guide
Author Alan Field
This pocket guide introduces the premise of RBT (risk-based thinking), exploring the principles outlined in the risk management standard, ISO 31000:2018. Understand the benefits of risk-based thinking and ISO 31000 with this pocket guide!
Release Date 2023/03 -
Author Darren Death
Implement information security effectively as per your organization's needs.About This BookLearn to build your own information security framework, the best fit for your organizationBuild on the concepts of threat modeling, incidence response, and security analysis....
Release Date 2017/12 -
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order .... -
Author Peter Sidorko , Steve O’Connor
In this information age it is widely recognised that, in order to maintain relevance and to gain a competitive edge, libraries and other organisations in the business of information must continuously assess their roles, collections, services and perhaps most importa....
Release Date 2010/09 -
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
Mobile Security: A Pocket Guide
Author Steven Furnell
A concise and practical guide to mobile securityThis pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone.Written by one of the country's top academic experts on information security, the guide covers s....
Release Date 2009/07 -
Coping with Unplanned Absences: A Pocket Guide
Author Sarah Cook
Unplanned absence from work could cost the UK economy as much as £12 billion a year! When your organisation can no longer meet its deadlines, or provide customers with the high quality of service they expect, you have a problem. Unplanned absence also has a bad effe....
Release Date 2010/06 -
ISO27000 and Information Security: A Combined Glossary
Author Steve G. Watkins , Alan Calder
Get to grips with key ISO27000 and information security vocabulary with this indispensable, concise pocket guide! Information security is of crucial importance to your business. If you don't know the difference between a cookie and a worm, or between war-chalking....
Release Date 2010/03 -
ISO27001 / ISO27002 A Pocket Guide
Author Alan Calder
Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000Family of Info....
Release Date 2008/10 -
Author Paul Kearney
Deploy information security across the businessKnowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!Information technology plays a ....
Release Date 2010/12 -
OHSAS 18001 Step by Step: A Practical Guide
Author Naeem Sadiq
An essential guide to OHSAS 18001 We say 'take care' as we wave our loved ones goodbye in the morning, but how often is this message taken into the workplace? In this easy-to-understand and timely pocket guide, Naeem Sadiq, examines the Understanda as it gears ....
Release Date 2012/04 -
Author Andrea Simmons
Understand the role of Information Security ManagersYour responsibilities as an information security manager are critical. Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major securit....
Release Date 2012/08 -
ISO27001/ISO27002 A Pocket Guide, 2nd edition
Author Alan Calder
Information is one of your organisation’s most important resources and keeping that information secure is vital to your business. An information security management system (ISMS) based on ISO27001/ISO27002 offers a host of benefits: Improved efficiency by hav....
Release Date 2013/10 -
A Guide to Effective Internal Management System Audits
Author Andrew Nichols
Are your internal audits adding value?Organizations hoping to comply with any of the International Standards for management systems (e.g. ISO9001, ISO27001) must carry out internal audits. However, the requirements set down by accreditation bodies for auditor course....
Release Date 2014/06 -
Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition
Author Michael Krausz
What if you suffer an information security breach?Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions. Information Security Breaches - Avoidance....
Release Date 2014/05 -
Once More Unto the Breach: Managing information security in an uncertain world
Author Andrea C Simmons
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is t....
Release Date 2015/02 -
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things
Author Alan Field
When is a gift not a gift? When it’s a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, cor....
Release Date 2015/04 -
Application Security in the ISO 27001:2013 Environment
Author Vinod Vasudevan
Web application security as part of an ISO 27001-compliant information security management system Web application vulnerabilities are a common point of intrusion for cyber criminals. As cybersecurity threats proliferate and attacks escalate, and as applications pl....
Release Date 2015/10 -
Author Nick Orchiston , Steve Watkins
ISO 9001:2015 – A Pocket Guide is a handy reference book that provides an overview of the ISO 9001 quality management standard. This is the perfect introduction to the Standard, and will help ensure the quality of your products and services, increase customer....
Release Date 2016/05 -
Nine Steps to Success: An ISO27001:2013 implementation overview
Author Alan Calder
In Nine Steps to Success – An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps. Show and hide more
Release Date 2016/05 -
Nine Steps to Success: North American edition - An ISO 27001 Implementation Overview
Author Alan Calder
Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard....
Release Date 2017/10 -
ISO 37001: An Introduction to Anti-Bribery Management Systems
Author Alan Field
When is a gift not a gift? When it’s a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corpo....
Release Date 2017/11 -
Application Security in the ISO27001 Environment
Author Anbalahan Siddharth , Pakala Sangit , Shetty Sachin , Ummer Firosh , Mangla Anoop , V
As conduits of critical business data, it's vital that your software packages are adequately secured. The de-facto standard on application security, this book is your step-by-step guide to securing your software applications within a best practice ISO/IEC 27001 and....
Release Date 2008/04 -
An Introduction to Information Security and ISO27001: A Pocket Guide
Author Steve G Watkins
This new pocket guide is intended to meet the needs of two groups: Individual readers who have turned to it as an introduction to a topic that they know little about; and organizations implementing, or considering implementing, some sort of information security mana....
Release Date 2008/10 -
How to Survive a Data Breach: A Pocket Guide
Author Stewart Mitchell
This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with s....
Release Date 2009/02 -