Books

All books are published by Taylor & Francis and offered below retail prices to BlueBook Members only. Authors are thought leaders in their respective fields.

Showing 1–16 of 19 results

  • A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

    $58.88 price including tax

    The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.


  • Cognitive Hack: The New Battleground in Cybersecurity…the Human Mind

    $65.42 price including tax

    This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

     


  • Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program

    $57.94 price including tax

    The book addresses the corporate defense requirement from various perspectives and helps readers to understand the critical interconnections and inter-dependencies which exist at strategic, tactical, and operational levels. It facilitates the reader in comprehending the importance of appropriately prioritizing corporate defense at a strategic level, while also educating the reader in the importance of managing corporate defense at a tactical level, and executing corporate defense activities at an operational level.


  • Data Analytics for Internal Auditors

    $45.79 price including tax

    The increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools. This book takes an auditor from a zero base to an ability to professionally analyze corporate data seeking anomalies.


  • Ethics and the Internal Auditor’s Political Dilemma: Tools and Techniques to Evaluate a Company’s Ethical Culture

    $46.73 price including tax

    Lynn A. Fountain, CGMA, CRMA, MBA, has over 35 years of experience in the business profession, which includes public and industry accounting and over 20 years within internal and external auditing combined. She is a nationally recognized trainer and speaker and a published author. In April 2015, the Institute of Internal Auditors Research Foundation released Ms. Fountain’s first technical book “Raise the Red Flag – The Internal Auditor’s Guide to Fraud Evaluations. In October 2015, Ms. Fountain’s book “Leading The Internal Audit Function”, will be the first book released for Dan Swanson’s book series. Ms. Fountain has been a successful past Chief Audit Executive for two international companies. She was instrumental for implementation Sarbanes-Oxley in the initial years with her public utility. She has been recognized as a leader and innovator in SOX processes. She is a subject matter expert and specializes in Internal Audit, Sarbanes-Oxley, Enterprise Risk Management, Fraud, Governance and Compliance.


  • Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

    $65.42 price including tax

    Implementing Cybersecurity is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an “application” of the risk management process as well as the fundamental elements of control formulation within an applied context.


  • Internal Audit Practice from A to Z

    $59.81 price including tax

    Unique in that it is primarily written to guide internal auditors in the process and procedures necessary to carry out professionally accepted internal audit functions, it includes everything necessary to start, complete and evaluate an internal audit practice, simplifying the task for even non-professionals.


  • Leading the Internal Audit Function (Internal Audit and IT Audit)

    $42.06 price including tax

    Leading the Internal Audit Function includes real-life examples, scenarios, and lessons learned from internal auditors and CAEs to emphasize the importance of carefully managing all aspects of the internal audit. The author summarizes her many lessons learned into ten “commandments” for both CAEs and internal auditors. By following the guidelines in this book, you should be well-equipped to gain management support, perform effective and ethical audits, and uphold IIA Standards.


  • Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing

    $37.38 price including tax

    This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.


  • Operational Assessment of IT

    $55.14 price including tax

    After reading this book, you will be able to devise more efficient and economical ways to meet your customers’ requirements, no matter who or where your customers are. You will learn that the goal of any process is to service or supply customers with what they want. The book provides tools and techniques that will assist you in gaining a 360-degree view of the process so that you can help the business unit improve the delivery of a quality product or a service to the customer.


  • Operational Auditing: Principles and Techniques for a Changing World

    $57.01 price including tax

    Hernan Murdock is the president of Murdock Global Advisors, an internal audit, corporate governance, and human capital consulting firm. Previously, he was the director of training and development at a global internal audit firm. He has performed audit and consulting projects for clients in the manufacturing, transportation, high tech, education, insurance and power generation industries.Dr. Murdock is a senior lecturer at Northeastern University where he teaches management, leadership and ethics and frequently teaches courses for the MIS Training Institute. He is the author of 10 Key Techniques to Improve Team Productivity and Using Surveys in Internal Audits, both published by the IIA Research Foundation. He has also written articles and book chapters on whistle blowing programs, international auditing, mentoring programs, fraud, deception, corporate social responsibility, and behavioral profiling. He has delivered seminars and invited talks, and made numerous presentations at internal audit, academic and government functions in North America, Latin America, Europe and Africa.


  • Practitioner’s Guide to Business Impact Analysis

    $44.11 price including tax

    The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise.


  • Securing an IT Organization through Governance, Risk Management, and Audit

    $53.27 price including tax

    The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.


  • Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

    $42.99 price including tax

    Sajay Rai has more than 30 years of experience in information technology, specializing in information technology processes, IT architecture, security, business continuity, disaster recovery, privacy, IT audit and information risk. Mr. Rai is the Founder and CEO of Securely Yours LLC, which is focused on delivering innovative solutions through delivery channels like Software-as-a-Service, Managed Services and traditional IT consulting.


  • Software Quality Assurance: Integrating Testing, Security, and Audit

    $51.40 price including tax

    The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit.


  • The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

    $39.25 price including tax

    The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.