IT Governance Publishing Publisher Description

IT Governance Publishing (ITGP) is the world’s leading IT-GRC publishing imprint and wholly owned by IT Governance Ltd. Formed in 2005, the initial success of the ITGP product range was based on CEO Alan Calder’s popular and successful books on information security and IT governance.

With books and tools covering all IT governance, risk management, and compliance frameworks, they are the publisher of choice for authors and distributors alike, producing unique and practical publications of the highest quality, in the latest formats available, and which readers will find invaluable.

Books
Books in JSTOR from IT Governance Publishing
245 Books in JSTOR Copyright Date
21st Century Chinese Cyberwarfare 2012
50 Top IT Project Management Challenges 2012
Above the Clouds: Managing Risk in the World of Cloud Computing 2010
Adaptable Project Management – A combination of Agile and Project Management for All (PM4A) 2020
Agile: An Executive Guide: Real results from IT budgets 2011
Agile: An Executive Guide: Real results from IT budgets 2016
Agile Governance and Audit: An overview for auditors and agile teams 2014
Agile Principles Unleashed: Proven approaches for achieving real productivity gains in any organisation 2010
Agile Productivity Unleashed: Proven approaches for achieving productivity gains in any organisation 2014
Agile Productivity Unleashed: Proven approaches for achieving real productivity gains in any organization 2010
Agile Project Management, Assurance and Auditing: A practical guide for auditors, reviewers and project teams 2022
Agile SAP: Introducing flexibility, transparency and speed to SAP implementations 2013
Application Security in the ISO27001 Environment 2008
Application security in the ISO27001:2013 Environment 2015
The Art of Cyber Security: A practical guide to winning the war on cyber crime 2022
Artificial Intelligence: Ethical, Social and Security Impacts for the Present and the Future 2022
Assessing Information Security: Strategies, Tactics, Logic and Framework 2014
Assessing Information Security: Strategies, Tactics, Logic and Framework 2010
Assessing IT Projects to Ensure Successful Outcomes 2015
Availability and Capacity Management in the Cloud: An ITSM Narrative Account 2014
Breaking the Addiction to Process: An Introduction to Agile Project Management 2011
Build a Security Culture 2015
Building a High-Performance Team: Proven techniques for effective team working 2009
Business Continuity and the Pandemic Threat - Learning from COVID-19 while preparing for the next pandemic 2022
Business Continuity and the Pandemic Threat: Potentially the biggest survival challenge facing organisations 2016
Business Continuity Management: Choosing to Survive 2012
The California Consumer Privacy Act (CCPA): An implementation guide 2019
The California Privacy Rights Act (CPRA) – An implementation and compliance guide 2021
The Case for ISO27001:2013 2013
Catalogs, Services and Portfolios: An ITSM success story 2014
Changing how you manage and communicate change: Focusing on the human side of change 2009
The Chief Information Security Officer: Insights, tools and survival skills 2011
The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape 2023
Cloud Computing: Assessing the risks 2012
Cloud Security and Governance: Who's on your cloud? 2010
Coaching for High Performance: How to develop exceptional results through coaching 2009
Collaborative Business Design: Improving and innovating the design of IT-driven business services 2017
Collaborative Business Design: The Fundamentals 2018
Compliance by Design: IT controls that work 2011
Compliance for Green IT: A Pocket Guide 2009
Computer Forensics: A Pocket Guide 2010
A concise introduction to the NIS Directive: A pocket guide for digital service providers 2018
The Concise PRINCE2®: A Pocket Guide 2013
The Concise PRINCE2® - Principles and essential themes: Third edition 2019
Coping with Unplanned Absences: A Pocket Guide 2010
Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications 2023
Cyber Essentials: A Pocket Guide 2014
Cyber resilience: Defence-in-depth principles 2023
Cyber Risks for Business Professionals: A Management Guide 2010
Cyber Security: Essential principles to secure your organisation 2020
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks 2020
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide 2020
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger 2008
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment 2014
The Data Governance Imperative 2009
Data Protection and the Cloud: Are the risks too great? 2015
Data Protection and the Cloud - Are you really managing the risks?: Second edition 2018
Data Protection Compliance in the UK: A Pocket Guide 2010
Data Protection vs. Freedom of Information: Access and Personal Data 2008
The Definitive Guide to IT Service Metrics 2012
The Definitive Guide to the C&A Transformation Process: The First Publication of a Comprehensive View of the C&A Transformation 2009
Digital Earth: Cyber threats, privacy and ethics in an age of paranoia 2022
Directing The Agile Organisation: A lean approach to business management 2013
Disaster Recovery and Business Continuity 3rd edition: A Quick Guide for Small Organizations and Busy Executives 2014
Disaster Recovery and Business Continuity: A Quick Guide for Small Organizations and Busy Executives 2008
DORA: A guide to the EU digital operational resilience act 2024
E-Discovery and the Federal Rules of Civil Procedures 2007
An Education in Service Management: A guide to building a successful service management career and delivering organisational success 2023
Effective Career Development: Advice for establishing an enjoyable career 2022
The Effective Manager: Management skills for high performance 2009
E-mail Security: A Pocket Guide 2010
Enterprise Architecture: A Pocket Guide 2009
Essential Time Management and Organisation: A Pocket Guide 2011
Establishing an occupational health & safety management system based on ISO 45001 2019
The EU Data Protection Code of Conduct for Cloud Service Providers: A guide to compliance 2021
EU GDPR - A pocket guide, second edition 2018
EU GDPR – An international guide to compliance 2020
EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition 2020
EU General Data Protection Regulation (GDPR), third edition: An Implementation and Compliance Guide 2019
Europrivacy™/®: The first European Data Protection Seal 2024
Everything you want to know about Agile: How to get Agile results in a less-than-agile organization 2012
Everything you want to know about Business Continuity 2012
Everything you want to know about Organisational Change 2011
Exploding the Myths Surrounding ISO9000: A practical implementation guide 2013
Fundamentals of Assurance for Lean Projects 2017
Fundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors 2016
Governance and Internal Controls for Cutting Edge IT 2013
Governance of Enterprise IT based on COBIT 5: A Management Guide 2013
The Governance of Green IT: The Role of Processes in Reducing Data Center Energy Requirements 2008
The Green Agenda: A Business Guide 2009
Green IT in Practice: How one company is approaching the greening of its IT 2010
The Green Office: A Business Guide 2009
Greening the Data Center: A Pocket Guide 2009
A Guide to Effective Internal Management System Audits: Implementing internal audits as a risk management tool 2014
How Cyber Security Can Protect Your Business: A guide for all stakeholders 2019
How to Survive a Data Breach: A Pocket Guide 2009
I nove passi per il successo: Compendio per l’attuazione della norma ISO 27001:2013 2017
Illustrating PRINCE2: Project management in real terms 2012
Implementación de Calidad de Servicio basado en ISO/IEC 20000: Una Guía de Gestión 2012
Implementierung von Service-Qualita basierend auf ISO/IEC 20000: Ein Management-Leitfaden 2012
Implementing an Integrated Management System (IMS): The strategic approach 2019
Implementing ISO 9001:2015 – A practical guide to busting myths surrounding quality management systems 2022
Implementing Service Quality based on ISO/IEC 20000: A Management Guide 2012
In Hindsight: A compendium of Business Continuity case studies 2014
Information Security A Practical Guide: Bridging the gap between IT and management 2015
Information Security Breaches: Avoidance and Treatment based on ISO27001 2014
Information Security Breaches: Avoidance and Treatment based on ISO27001 2009
Information Security Law: The Emerging Standard for Corporate Compliance 2008
Information Security Risk Management for ISO 27001/ISO 27002, third edition 2019
Information Security Risk Management for ISO27001/ISO27002 2010
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within 2016
The Insider Threat: Combatting the Enemy Within 2009
Integrated Measurement - KPIs and Metrics for ITSM: A narrative account 2013
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things 2015
An Introduction to Hacking and Crimeware: A Pocket Guide 2012
An Introduction to Information Security and ISO27001:2013: A Pocket Guide 2013
ISO 14001 Step by Step - A practical guide: Second edition 2019
ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) 2021
ISO 27001 Controls – A guide to implementing and auditing 2019
ISO 27001/ISO 27002: A guide to information security management systems 2023
ISO 37001: An Introduction to Anti-Bribery Management Systems 2017
ISO 50001: A strategic guide to establishing an energy management system 2019
ISO 9001:2015: A Pocket Guide 2016
ISO14001 Step by Step: A practical guide 2011
ISO19770-1:2012 SAM Process Guidance: A kick-start to your SAM programme 2012
ISO22301: 2019 - An introduction to a business continuity management system (BCMS) 2020
ISO22301: A Pocket Guide 2013
ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment 2010
ISO27001 in a Windows Environment: The best practice implementation handbook for a Microsoft Windows environment 2014
ISO27001:2013 Assessments Without Tears 2013
ISO27001/ISO27002: Ein Taschenführer 2017
ISO27001/ISO27002: Guida tascabile 2017
ISO27001/ISO27002: Un guide de poche 2017
ISO27001/ISO27002: Una guía de bolsillo 2017
ISO27001/ISO27002:2013: A Pocket Guide 2013
ISO/IEC 20000: An Introduction to the global standard for service management 2011
ISO/IEC 27001:2022: An introduction to information security and the ISMS standard 2022
ISO/IEC 27701:2019: An introduction to privacy information management 2020
ISO/IEC 38500: A pocket guide, second edition 2019
ISO/IEC 38500: The IT Governance Standard 2008
IT Asset Management: A Pocket Survival Guide 2011
IT for Business (IT4B): From Genesis to Revolution, a business and IT approach to digital transformation 2018
IT Governance: A Pocket Guide 2007
IT Governance: Guidelines for Directors 2005
IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT 2009
IT Governance to Drive High Performance: Lessons from Accenture 2010
IT Governance Today: A Practitioners Handbook 2005
IT Induction and Information Security Awareness: A Pocket Guide 2010
IT Outsourcing Contracts: A Legal and Practical Guide 2009
IT Project Management: 30 steps to success 2011
IT Regulatory Compliance in North America 2007
IT Regulatory Compliance in the UK 2007
ITIL® 4 Create, Deliver and Support (CDS): Your companion to the ITIL 4 Managing Professional CDS certification 2021
ITIL® 4 Direct, Plan and Improve (DPI): Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI certification 2021
ITIL® 4 Drive Stakeholder Value (DSV): Your companion to the ITIL 4 Managing Professional DSV certification 2022
ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond, second edition 2020
ITIL® 4 High-velocity IT (HVIT): Your companion to the ITIL 4 Managing Professional HVIT certification 2021
ITIL Foundation Essentials ITIL 4 Edition - The ultimate revision guide, second edition 2020
ITIL Foundation Essentials: The exam facts you need 2012
ITIL Lifecycle Essentials: Your essential guide for the ITIL Foundation exam and beyond 2013
It's All About Relationships: What ITIL® doesn't tell you 2013
The ITSM Iron Triangle: Incidents, changes and problems 2012
Leading for Success: Unleash your leadership potential to achieve extraordinary results 2009
Lessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure 2018
Making a Success of Managing and Working Remotely 2019
A Manager's Guide to ISO22301: A practical guide to developing and implementing a business continuity management system 2013
Managing Business Transformation: A Practical Guide 2011
Managing in a Service-Focused World: I, team, stewards and marketplace 2014
Managing Information Risk: A Director's Guide 2009
Managing Information Security Breaches: Studies from Real Life 2010
Managing Information Security Breaches: Studies from real life 2014
Managing IT in a Downturn: A Pocket Guide 2008
Measuring your IT: Identifying the metrics that matter 2012
Mobile Security: A Pocket Guide 2009
Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers 2018
Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services 2018
Neuf étapes vers le succès: Un aperçu de la mise en œuvre de la norme ISO 27001:2013 2017
Neun Schritte zum Erfolg: Ein Überblick zur Implementierung der Norm ISO 27001:2013 2017
Nine Steps to Success: An ISO27001:2013 Implementation Overview 2016
Nine Steps to Success: An ISO27001:2013 Implementation Overview 2013
Nine Steps to Success: North American edition: An ISO 27001 Implementation Overview 2017
NIST Cybersecurity Framework: A pocket guide 2018
No One of Us is as Strong as All of Us: Services, catalogs and portfolios 2012
Nueve pasos para el éxito: Una visión de conjunto para la aplicación de la ISO 27001:2013 2017
OHSAS 18001 Step by Step: A Practical Guide 2012
Once more unto the Breach: Managing information security in an uncertain world 2015
Once more unto the Breach: Managing information security in an uncertain world 2012
Outsourcing IT: A governance guide 2009
PCI DSS: A Pocket Guide 2016
PCI DSS: A Pocket Guide 2011
PCI DSS: A Pocket Guide - 3rd edition 2013
PCI DSS: A Pocket Guide, fourth edition 2015
PCI DSS: A pocket guide, sixth edition 2019
PCI DSS: A practical guide to implementing and maintaining compliance 2011
PCI DSS Version 4.0: A guide to the payment card industry data security standard 2024
Penetration Testing: Protecting networks and systems 2012
Penetration Testing Services Procurement Guide 2014
The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team 2013
The Power of the Agile Business Analyst, second edition: 30 surprising ways a business analyst can add value to your Agile development team 2018
Practical IT Service Management: A concise guide for busy executives 2014
Practical IT Service Management: A Concise Guide for Busy Executives 2008
Pragmatic Application of Service Management: The Five Anchor Approach 2016
Pragmatic Application of Service Management: The Five Anchor Approach 2014
Presentation Skills for Technical Professionals: Achieving Excellence 2010
PRINCE2 Agile An Implementation Pocket Guide: Step-by-step advice for every project type 2016
The PRINCE2 Agile® Practical Implementation Guide – Step-by-step advice for every project type, Second edition 2021
PRINCE2 in Action: Project management in real terms 2018
Procuring Penetration Testing Services 2014
Project Governance: The Essentials 2011
The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour 2016
The Quantum Age of IT: Why everything you know about IT is about to change 2012
The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks 2021
Release and Deployment: An ITSM narrative: An ITSM narrative 2015
Resilient Thinking: Protecting Organisations in the 21st Century 2012
Resilient Thinking: Protecting organisations in the 21st century, Second edition 2023
Reviewing IT in Due Diligence: Are you buying an IT asset or liability 2015
Right First Time: Buying and integrating advanced technology for project success 2021
Risk Assessment for Asset Owners 2007
Risk Management and ISO 31000: A pocket guide 2023
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT 2012
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud 2012
Securing Cloud Services - A pragmatic guide: Second edition 2020
The Security Consultant's Handbook 2015
Security in the Digital World 2017
Security Testing Handbook for Banking Applications 2009
Security: The Human Factor 2010
Selection Management: For Systems and Services 2012
Selling Information Security to the Board: A Primer 2016
Selling Information Security to the Board: A Primer 2010
The Service Desk Handbook ??? A guide to service desk implementation, management and support 2020
Service Integration and Management (SIAM™) Foundation Body of Knowledge (BoK), Second edition 2021
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition 2021
Service Level Agreements: A legal and practical guide 2010
SIAM/MSI: An Introduction to Service Integration and Management/ Multi-Sourcing Integration for IT Service Management 2016
Software Life Cycle Management Standards: Real-world Scenarios and Solutions for Savings 2011
SWANSON on Internal Auditing: Raising the Bar 2010
The Tao of Open Source Intelligence 2015
Ten Steps to ITSM Success: A Practitioner’s Guide to Enterprise IT Transformation 2013
The True Cost of Information Security Breaches and Cyber Crime 2013
Turning Heads and Changing Minds: Transcending IT Auditor Archetypes 2013
Two-Factor Authentication 2015
The Universal Service Desk (USD): Implementing, controlling and improving service delivery 2020
Validating Your Business Continuity Plan: Ensuring your BCP actually works 2015
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely 2015
Well-being in the workplace: A guide to resilience for individuals and teams 2021