Search books
















IT Governance Ltd's Books

My Rights

The Power of the Agile Business Analyst

Jamie Lynn Cooke

The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team chall etc...

30 Key Questions that Unlock Management

Brian Sutton and Robina Chatham

Understand and solve people management problems Let’s be honest. No matter how good we are at our jobs, we’re etc...

Agile Governance and Audit

Christopher Wright

Written for auditors and Agile managers, Agile Governance and Audit bridges the gap between traditional auditing approaches and t etc...

Assessing Information Security

Andrew A. Vladimirov

What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the autho etc...

Application security in the ISO27001 Environment

Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan

Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001. It does th etc...

The Power of the Agile Business Analyst

Jamie Lynn Cooke

The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team chall etc...

The Power of the Agile Business Analyst

Jamie Lynn Cooke

The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team chall etc...

The True Cost of Information Security Breaches and Cyber Crime

Michael Krausz, John Walker

This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sens etc...

The True Cost of Information Security Breaches and Cyber Crime

Michael Krausz, John Walker

This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sens etc...

The True Cost of Information Security Breaches and Cyber Crime

Michael Krausz, John Walker

This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sens etc...

Once More Unto the Breach

Andrea C Simmons

Securing Cloud Services

Lee Newcombe

Every Cloud should have a secure lining Cloud Computing represents a major change to the IT services landscape. Cloud services, s etc...
From:
Select date range