View All Book Series

BOOK SERIES


Security, Audit and Leadership Series


About the Series

Formerly the Internal Audit and IT Audit series - now rebranded and wider in scope!

The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.

Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT, Audit Management and Leadership, and Operational Auditing.

If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]

65 Series Titles

Per Page
Sort

Display
Cognitive Hack The New Battleground in Cybersecurity ... the Human Mind

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

1st Edition

By James Bone
August 02, 2021

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security ...

Operational Assessment of IT

Operational Assessment of IT

1st Edition

By Steve Katzman
August 02, 2021

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization’s business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks, ...

Practitioner's Guide to Business Impact Analysis

Practitioner's Guide to Business Impact Analysis

1st Edition

By Priti Sikdar
August 02, 2021

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists...

Security and Auditing of Smart Devices Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

1st Edition

By Sajay Rai, Philip Chukwuma, Richard Cozart
August 02, 2021

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the ...

Software Quality Assurance Integrating Testing, Security, and Audit

Software Quality Assurance: Integrating Testing, Security, and Audit

1st Edition

By Abu Sayed Mahfuz
August 02, 2021

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and ...

Operational Auditing Principles and Techniques for a Changing World

Operational Auditing: Principles and Techniques for a Changing World

2nd Edition

By Hernan Murdock
July 02, 2021

Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits. It shows how to effectively evaluate the relevant dynamics associated with programs and processes, including ...

Internal Audit Practice from A to Z

Internal Audit Practice from A to Z

1st Edition

By Patrick Onwura Nzechukwu
April 29, 2021

Internal Audit Practice from A to Z addresses the practice of internal auditing using GAAS (Generally Accepted Auditing Standards), GAGAS (Generally Accepted Government Auditing Standards) and International Standards for the Professional Practice of Internal Auditing (Standards)-IPPF, International...

Leading the Internal Audit Function

Leading the Internal Audit Function

1st Edition

By Lynn Fountain
April 29, 2021

While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to ...

Corporate Defense and the Value Preservation Imperative Bulletproof Your Corporate Defense Program

Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program

1st Edition

By Sean Lyons
March 31, 2021

This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s ...

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

1st Edition

By Richard E. Cascarino
October 06, 2020

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system ...

Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications

1st Edition

Edited By Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Imed Romdhani
August 03, 2020

Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not ...

The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

1st Edition

By Daniel Shoemaker, Anne Kohnke, Ken Sigler
April 20, 2020

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity ...

37-48 of 65
AJAX loader