Publisher of Humanities, Social Science & STEM Books

View All Book Series

BOOK SERIES


Internal Audit and IT Audit


About the Series

The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting new series is to produce leading-edge books on critical subjects facing audit executives as well as internal and IT audit practitioners.

Key topics that will be addressed over the coming years include Audit Leadership, Cybersecurity, Strategic Risk Management, Auditing Various IT Activities and Processes, Audit Management, and Operational Auditing.

If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]

30 Series Titles

Per Page
Sort

Display
The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

1st Edition

Forthcoming

Richard E. Cascarino
October 06, 2020

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system ...

Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications

1st Edition

Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Imed Romdhani
August 03, 2020

Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not ...

The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

1st Edition

Daniel Shoemaker, Anne Kohnke, Ken Sigler
April 20, 2020

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity ...

Corporate Governance A Pragmatic Guide for Auditors, Directors, Investors, and Accountants

Corporate Governance: A Pragmatic Guide for Auditors, Directors, Investors, and Accountants

1st Edition

Vasant Raval
April 15, 2020

This book facilitates a systematic comprehension of internal workings of corporate governance in practice. Facets of this multidisciplinary, constantly evolving field are discussed and interrelationships among them are explained to provide insights on how certain precepts come into play for various...

Why CISOs Fail The Missing Link in Security Management--and How to Fix It

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

1st Edition

Barak Engel
October 12, 2017

This book serves as an introduction into the world of security and provides insight into why and how current security management practices fail, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examines the reasons and suggests how ...

The Audit Value Factor

The Audit Value Factor

1st Edition

Daniel Samson
August 14, 2019

The Audit Value Factor: Making Management’s Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization. The book explores how to identify, quantify, and articulate value for customers. It details six critical success factors: Value ...

Managing IoT Systems for Institutions and Cities

Managing IoT Systems for Institutions and Cities

1st Edition

Chuck Benson
July 15, 2019

This book defines what IoT Systems manageability looks like and what the associated resources and costs are of that manageability. It identifies IoT Systems performance expectations and addresses the difficult challenges of determining actual costs of IoT Systems implementation, operation, and ...

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

1st Edition

Shaun Aghili
May 06, 2019

This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also ...

How to Build a Cyber-Resilient Organization

How to Build a Cyber-Resilient Organization

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
December 03, 2018

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of ...

Auditor Essentials 100 Concepts, Tips, Tools, and Techniques for Success

Auditor Essentials: 100 Concepts, Tips, Tools, and Techniques for Success

1st Edition

Hernan Murdock
October 09, 2018

Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession. This easy to use reference makes this process easier and ensures auditors can obtain needed information quickly and ...

Project Management Capability Assessment Performing ISO 33000-Based Capability Assessments of Project Management

Project Management Capability Assessment: Performing ISO 33000-Based Capability Assessments of Project Management

1st Edition

Peter T. Davis, Barry D. Lewis
September 18, 2018

Learn how to perform project management according to international standards of compliance using capability assessment processes. This book compares and contrasts the approach to project management using ISO 21500 against the more direct ISO 33000 Capability Assessment. It shows how to assess ...

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
February 08, 2016

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship...

1-12 of 30
AJAX loader