You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.
Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.
Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning In his second book with IT Governance Publishing, Richard Bingley’s Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. This book discusses: Definitions of cyber terrorism; Ideologies and idealisations that can lead to cyber terrorism; How threat actors use computer systems to diversify, complicate and increase terrorist attack impacts; The role of Big Tech and social media organisations such as X (formerly Twitter) and I...
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you’ll learn wh...
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.
The experience of thinking about, preparing, or writing a text, be it a book review, or about an art exhibition, cannot be limited solely to the artistic experience. There must always be another kind of challenge. I want that elusive thing that I found, together with the encounter that I had with the "object" and the experience we lived together. Every day when I wake up, I don't think about writing, but I wonder whether I'll be able to rise to the calling of that particular "object" (a book, a painting, a play, opera, etc.). The "characters" in them are never marginal figures. I know that they exist but I do not know them, I do not confront myself with them, or I only do so in highly stereotypical situations where they almost become invisible. When I write about something, this is my attempt at turning the invisible into the visible.
How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology.
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
A quick overview of the more serious threats posed by hackers and online criminals, and how you might combat them.