Information Security Cost Management

Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010

Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010 by Sebastian Klipper
2011 | ISBN: 3834813605 | German | 234 pages | PDF | 3 MB
Information Security Governance: A Practical Development and Implementation Approach(Repost)

Information Security Governance: A Practical Development and Implementation Approach by Krag Brotby
English | 2009 | ISBN: 0470131187 | 220 Pages | PDF | 3.04 MB
Practical Information Security Management: A Complete Guide to Planning and Implementation

Practical Information Security Management: A Complete Guide to Planning and Implementation by TONY CAMPBELL
2016 | ISBN: 1484216849 | English | 237 pages | PDF | 9 MB
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement (repost)

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement by W. Krag Brotby CISM
English | 2009 | ISBN: 1420052853 | 200 pages | PDF | 11,6 MB
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement by W. Krag Brotby CISM
English | 2009 | ISBN: 1420052853 | 200 pages | PDF | 11,6 MB

Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical.

Information Security Applications  eBooks & eLearning

Posted by AvaxGenius at March 29, 2017
Information Security Applications

Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers By Choi Dooho Guilley Sylvain
English | PDF | 2017 | 409 Pages | ISBN : 3319565486 | 27.32 MB

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.
The Psychology of Information Security : Resolving Conflicts Between Security Compliance and Human Behaviour

The Psychology of Information Security :
Resolving Conflicts Between Security Compliance and Human Behaviour

by Leron Zinatullin
English | 2016 | ISBN: 1849287899 | 120 Pages | PDF | 0.9 MB

No approach to security can ever succeed without considering people – and as a profession we need to look beyond our computers to understand the business, the culture of the organisation, and, most of all, how we can create a security environment which helps people feel free to actually do their job.

Information Security and Cryptology -- ICISC 2013  eBooks & eLearning

Posted by DZ123 at March 16, 2017
Information Security and Cryptology -- ICISC 2013

Hyang-Sook Lee, Dong-Guk Han, "Information Security and Cryptology – ICISC 2013"
English | 2014 | ISBN: 3319121596 | PDF | pages: 536 | 18.5 mb

Information Processing and Management of Uncertainty, Part2  eBooks & eLearning

Posted by DZ123 at March 15, 2017
Information Processing and Management of Uncertainty, Part2

Anne Laurent, Olivier Strauss, Bernadette Bouchon-Meunier, "Information Processing and Management of Uncertainty, Part2"
English | 2014 | ISBN: 3319088548 | PDF | pages: 647 | 22.1 mb

Information Security Management Principles, 2nd edition (repost)  eBooks & eLearning

Posted by nebulae at March 13, 2017
Information Security Management Principles, 2nd edition (repost)

David Alexander and Amanda Finch, "Information Security Management Principles, 2nd edition"
English | ISBN: 1780171757 | 2013 | 288 pages | EPUB | 2 MB