Title: The Case for ISO27001, Author: Alan Calder
Title: Nine Steps to Success: An ISO27001 Implementation Overview, Author: Alan Calder
Title: How to Cheat at Managing Information Security, Author: Mark Osborne
Title: Security Metrics, Author: Andrew Jaquith
Title: How to Achieve 27001 Certification: An Example of Applied Compliance Management, Author: Sigurjon Thor Arnason
Title: Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, Author: W. Krag Brotby
Title: Computer and Information Security Handbook, Author: John R. Vacca
Title: Information Security Management Handbook, Volume 3, Author: Harold F. Tipton
Title: Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work, Author: Scott Gordon
Title: Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website, Author: Daniel Domscheit-Berg
Title: Integrated Security Systems Design: Concepts, Specifications, and Implementation, Author: Thomas L. Norman
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Information Risk and Security: Preventing and Investigating Workplace Computer Crime, Author: Edward Wilding
Title: Army Techniques Publication ATP 6-02.71 Techniques for Department of Defense Information Network Operations April 2019, Author: United States Government Us Army
Title: How to Deploy One Password for Online Securities, Author: Abby Lotts
Title: How to Manage Cybersecurity Risk, Author: Christopher T. Carlson
Title: Cybercon: Protecting Ourselves from Big Tech & Bigger Lies, Author: Dr. James L. Norrie
Title: Army Techniques Publication ATP 6-02.75 Techniques for Communication Security May 2020, Author: United States Government Us Army
Title: PTFM, Author: Tim Bryant

Pagination Links