The Agile auditing challenge Many auditors are now encountering Agile management methodologies fo...
A clear, concise primer on the GDPRThe GDPR aims to unify data protection and ease the flow of pe...
Understand how to implement an IMS (integrated management system) and how it can benefit your org...
In the world as we know it, you can be attacked both physically and virtually. For today's organi...
'IT as we know it is dead.'Forces are at work that are reshaping the very fabric of the IT organi...
Implement Asset Management and reap the rewards!IT Asset Management (ITAM) is the set of busine...
An in-depth guide to complying with the EU GDPR.Now in its second edition, EU GDPR - An Implement...
Building a High-Performance Team is intended to provide IT managers with informative and practica...
Improve employee safety, reduce workplace incidents and create better, safer working conditionsAc...
The fastest-growing malware in the worldThe core functionality of ransomware is two-fold: to encr...
Adaptable Project Management - A combination of Agile and Project Management for All (PM4A)Projec...
When is a gift not a gift? When it's a bribe.For many, corporate hospitality oils the wheels of c...
'Love the fact that it jumped in with 10 top tips for security, a great opening to the book&helli...
SummaryExplains in easy-to-understand terms what executives and senior managers need to know and ...
Understand your projectMany senior executives in 'non-project' industries are charged with initia...
PRINCE2® is a widely used project management method that can be tailored to any project, of any s...
Business continuity is crucial to the survival of your business. Learn how to manage it effective...
Create a more robust service management system using the best of ITIL®, ISO IEC 20000-1, COBIT®, ...
Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply w...
In today's corporations, information security professionals have a lot on their plate. In the fac...
Safeguard your organisation's future with business continuity managementBusiness continuity - pla...
The activities of the cyber criminal are both deliberate and hostile, and they can be compared to...
Istruzioni per la corretta attuazione della Norma ISO 27001Con un linguaggio funzionale e scevro ...
Your technical skills and professional expertise are evidence of your ability to accomplish diffi...
Proteja la información de su organización con la ISO27001:2013La información es uno de los recurs...
This book presents the relatively new Agile approach to SAP, which has proven to be very successf...
Coaching for High Performance is intended to inspire IT managers with practical advice and tips o...
Understand Metrics and KPIs for IT Service ManagementWhen companies look to identify opportunit...
A universal service desk (USD) is the central point of contact between a service provider and use...
Securing Cloud Services - A pragmatic guide gives an overview of security architecture processes ...
Deliver exceptional results from your IT department using Agile approaches. Agile methodologies a...
The challenges you face as an information security manager (ISM) have increased enormously since ...
An Introduction to IT GovernanceIf you are unsure what IT governance is, or how it is relevant to...
Effective time-management techniques to revolutionise the way you work!Do you struggle to get eve...
This pocket guide is a primer for any OES (operators of essential services) that needs to comply ...
ITIL® 4 is the latest evolution of the leading best-practice framework for ITSM (IT service manag...
Your business information is likely to be much more valuable than the hardware on which it is sto...
Prepare for the ITIL Foundation exam ITIL is best practice for IT Service Management, developed b...
Practical guidance on COBIT®5 implementation COBIT®5 (Control Objectives for Information and rela...
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of th...
Succeed as a PRINCE2® practitioner with this concise overview.PRINCE2 is the leading model for ef...
With a view to helping managers ask the right questions, Data Protection and the Cloud explains h...
Protect your organisation from information security risks For any modern business to thrive, it m...
The essentials of Business Continuity Management in a nutshell. ISO22301: A Pocket Guide will hel...
The truth about integrating Cloud services and ITSMCloud functionality increases flexibility and ...
The ideal primer for anyone implementing an Information Security Management SystemWritten by an...
Used by the UK government and extensively throughout the world, PRINCE2® uses seven principles, s...
ITIL is the leading best-practice framework for ITSM (IT service management) and is globally adop...