Access

You are not currently logged in.

Access your personal account or get JSTOR access through your library or other institution:

login

Log in to your personal account or through your institution.

IT Governance Publishing

Publisher Description

IT Governance Publishing (ITGP) is the world’s leading IT-GRC publishing imprint and wholly owned by IT Governance Ltd. Formed in 2005, the initial success of the ITGP product range was based on CEO Alan Calder’s popular and successful books on information security and IT governance.

With books and tools covering all IT governance, risk management, and compliance frameworks, they are the publisher of choice for authors and distributors alike, producing unique and practical publications of the highest quality, in the latest formats available, and which readers will find invaluable.

Books
Books in JSTOR from IT Governance Publishing
168 Books in JSTOR Copyright Date
21st Century Chinese Cyberwarfare 2012
30 Key Questions that Unlock Management 2012
50 Top IT Project Management Challenges 2012
Above the Clouds: Managing Risk in the World of Cloud Computing 2010
Agile: An Executive Guide: Real results from IT budgets 2011
Agile: An Executive Guide: Real results from IT budgets 2016
Agile Governance and Audit: An overview for auditors and agile teams 2014
Agile Principles Unleashed: Proven approaches for achieving real productivity gains in any organisation 2010
Agile Productivity Unleashed: Proven approaches for achieving productivity gains in any organisation 2014
Agile Productivity Unleashed: Proven approaches for achieving real productivity gains in any organization 2010
Agile SAP: Introducing flexibility, transparency and speed to SAP implementations 2013
Application security in the ISO27001 Environment 2008
Application security in the ISO27001:2013 Environment 2015
Assessing Information Security: Strategies, Tactics, Logic and Framewortk 2014
Assessing Information Security: Strategies, Tactics, Logic and Framework 2010
Assessing IT Projects to Ensure Successful Outcomes 2015
Availability and Capacity Management in the Cloud: An ITSM Narrative Account 2014
Breaking the Addiction to Process: An Introduction to Agile Project Management 2011
Build a Security Culture 2015
Building a High-Performance Team: Proven techniques for effective team working 2009
Business Continuity and the Pandemic Threat 2016
Business Continuity Management: Choosing to Survive 2012
Business Management Controls: A guide 2012
The Case for ISO27001:2013 2013
Catalogs, Services and Portfolios: An ITSM success story 2014
Changing how you manage and communicate change: Focusing on the human side of change 2009
Changing the IT Leader's Mindset: Time for revolution rather than evolution 2010
The Chief Information Security Officer: Insights, tools and survival skills 2011
Cloud Computing: Assessing the risks 2012
Cloud Security and Governance: Who's on your cloud? 2010
Coaching for High Performance: How to develop exceptional results through coaching 2009
Compliance by Design: IT controls that work 2011
Compliance for Green IT: A Pocket Guide 2009
Computer Forensics: A Pocket Guide 2010
The Concise PRINCE2®: A Pocket Guide 2013
Controles estratégicos y operacionales de la TI 2013
Coping with Unplanned Absences: A Pocket Guide 2010
Cyber Essentials: A Pocket Guide 2014
Cyber Risks for Business Professionals: A Management Guide 2010
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger 2008
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment 2014
The Data Governance Imperative 2009
Data Protection and the Cloud: Are the risks too great? 2015
Data Protection Compliance in the UK: A Pocket Guide 2010
Data Protection vs. Freedom of Information: Access and Personal Data 2008
The Definitive Guide to IT Service Metrics 2012
The Definitive Guide to the C&A Transformation Process: The First Publication of a Comprehensive View of the C&A Transformation 2009
Directing The Agile Organisation: A lean approach to business management 2013
Disaster Recovery and Business Continuity: A Quick Guide for Small Organizations and Busy Executives 2008
Disaster Recovery and Business Continuity 3rd edition: A Quick Guide for Small Organizations and Busy Executives 2014
E-Discovery and the Federal Rules of Civil Procedures 2007
The Effective Manager: Management skills for high performance 2009
Email Security: A Pocket Guide 2010
Enterprise Architecture: A Pocket Guide 2009
Essential Time Management and Organisation: A Pocket Guide 2011
EU GDPR A Pocket Guide 2016
Everything you want to know about Agile: How to get Agile results in a less-than-agile organization 2012
Everything you want to know about Business Continuity 2012
Everything you want to know about Organisational Change 2011
Exploding the Myths Surrounding ISO9000: A practical implementation guide 2013
Fundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors 2016
Governance and Internal Controls for Cutting Edge IT 2013
Governance of Enterprise IT based on COBIT®5: A Management Guide 2013
The Governance of Green IT: The Role of Processes in Reducing Data Center Energy Requirements 2008
The Green Agenda: A Business Guide 2009
Green IT in Practice: How one company is approaching the greening of its IT 2010
The Green Office: A Business Guide 2009
Greening the Data Center: A Pocket Guide 2009
A Guide to Effective Internal Management System Audits: Implementing internal audits as a risk management tool 2014
How to Survive a Data Breach: A Pocket Guide 2009
Illustrating PRINCE2: Project management in real terms 2012
Implementación de Calidad de Servicio basado en ISO/IEC 20000: Una Guía de Gestión 2012
Implementierung von Service-Qualita basierend auf ISO/IEC 20000: Ein Management-Leitfaden 2012
Implementing Service Quality based on ISO/IEC 20000: A Management Guide 2012
In Hindsight: A compendium of Business Continuity case studies 2014
Information Security A Practical Guide: Bridging the gap between IT and management 2015
Information Security Breaches: Avoidance and Treatment based on ISO27001 2014
Information Security Breaches: Avoidance and Treatment based on ISO27001 2009
Information Security Law: The Emerging Standard for Corporate Compliance 2008
Information Security Risk Management for ISO27001/ISO27002 2010
The Insider Threat: Combatting the Enemy Within 2009
Integrated Measurement - KPIs and Metrics for ITSM: A narrative account 2013
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things 2015
An Introduction to Hacking and Crimeware: A Pocket Guide 2012
An Introduction to Information Security and ISO27001:2013: A Pocket Guide 2013
ISO 9001: A Pocket Guide 2016
ISO14001 Step by Step: A practical guide 2011
ISO19770-1:2012 SAM Process Guidance: A kick-start to your SAM programme 2012
ISO22301: A Pocket Guide 2013
ISO27001 in a Windows ® Environment: The best practice handbook for a Microsoft® Windows® environment 2010
ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment 2014
ISO27001 / ISO27002: A Pocket Guide 2013
ISO27001:2013 Assessments Without Tears 2013
ISO/IEC 20000: An Introduction to the global standard for service management 2011
ISO/IEC 38500: The IT Governance Standard 2008
IT Asset Management: A Pocket Survival Guide 2011
IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT 2009
IT Governance: Guidelines for Directors 2005
IT Governance: A Pocket Guide 2007
IT Governance to Drive High Performance: Lessons from Accenture 2010
IT Governance Today: A Practitioners Handbook 2005
IT Induction and Information Security Awareness: A Pocket Guide 2010
IT Outsourcing Contracts: A Legal and Practical Guide 2009
IT Project Management: 30 steps to success 2011
IT Regulatory Compliance in North America 2007
IT Regulatory Compliance in the UK 2007
IT Strategic and Operational Controls 2010
ITIL and Organizational Change 2013
ITIL Foundation Essentials: The exam facts you need 2012
ITIL Lifecycle Essentials: Your essential guide for the ITIL Foundation exam and beyond 2013
It's All About Relationships: What ITIL® doesn't tell you 2013
The ITSM Iron Triangle: Incidents, changes and problems 2012
Leading for Success: Unleash your leadership potential to achieve extraordinary results 2009
A Manager's Guide to ISO22301: A practical guide to developing and implementing a business continuity management system 2013
Managing Business Transformation: A Practical Guide 2011
Managing in a Service-Focused World: I, team, stewards and marketplace 2014
Managing Information Risk: A Director's Guide 2009
Managing Information Security Breaches: Studies from Real Life 2010
Managing Information Security Breaches: Studies from real life 2014
Managing IT in a Downturn: A Pocket Guide 2008
Measuring your IT: Identifying the metrics that matter 2012
Mobile Security: A Pocket Guide 2009
Nine Steps to Success: An ISO27001:2013 Implementation Overview 2016
Nine Steps to Success: An ISO27001:2013 Implementation Overview 2013
No One of Us is as Strong as All of Us: Services, catalogs and portfolios 2012
OHSAS 18001 Step by Step: A Practical Guide 2012
Once more unto the Breach: Managing information security in an uncertain world 2015
Once more unto the Breach: Managing information security in an uncertain world 2012
Outsourcing IT: A governance guide 2009
PCI DSS: A Pocket Guide - 3rd edition 2013
PCI DSS: A Pocket Guide 2011
PCI DSS: A Pocket Guide, fifth edition 2016
PCI DSS: A Pocket Guide, fourth edition 2015
PCI DSS: A Practical Guide to Implementing and Maintaining Compliance 2011
Penetration Testing: Protecting Networks and Systems 2012
Penetration Testing Services Procurement Guide 2014
The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team 2013
Practical IT Service Management: A concise guide for busy executives 2014
Practical IT Service Management: A Concise Guide for Busy Executives 2008
Pragmatic Application of Service Management: The Five Anchor Approach 2014
Presentation Skills for Technical Professionals: Achieving Excellence 2010
PRINCE2 Agile An Implementation Pocket Guide: Step-by-step advice for every project type 2016
Procuring Penetration Testing Services 2014
Project Governance: The Essentials 2011
The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour 2016
The Quantum Age of IT: Why everything you know about IT is about to change 2012
Release and Deployment: An ITSM narrative 2015
Resilient Thinking: Protecting Organisations in the 21st Century 2012
Reviewing IT in Due Diligence: Are you buying an IT asset or liability 2015
Risk Assessment for Asset Owners 2007
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT 2012
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud 2012
Security: The Human Factor 2010
The Security Consultant's Handbook 2015
Security Testing Handbook for Banking Applications 2009
Selection Management: For Systems and Services 2012
Selling Information Security to the Board: A Primer 2016
Selling Information Security to the Board: A Primer 2010
Service Level Agreements: A legal and practical guide 2010
Software Life Cycle Management Standards: Real-world Scenarios and Solutions for Savings 2011
SWANSON on Internal Auditing: Raising the Bar 2010
The Tao of Open Source Intelligence 2015
Ten Steps to ITSM Success: A Practitioner’s Guide to Enterprise IT Transformation 2013
The True Cost of Information Security Breaches and Cyber Crime 2013
Turning Heads and Changing Minds: Transcending IT Auditor Archetypes 2013
Two-Factor Authentication 2015
Validating Your Business Continuity Plan 2015
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely 2015