Professional Documents
Culture Documents
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
WHATS INSIDE...
TABLE OF CONTENTS
4
COBIT PRODUCTS
COBIT 5 & Related Products
COBIT 4.1 & Related Products
14
20
NON-ENGLISH RESOURCES
36 RISK-RELATED
41
54
65
80
83
TITLE INDEX
ISACAS eLIBRARY
Browse over 575 titles on demand to supplement your
knowledge and sharpen your skills.
KNOWLEDGE CENTER
Dont face your technology challenges alone. Connect and
collaborate with like-minded professionals on topics of
mutual interest and share your real-world experiences.
ADVOCACY
Share your expertise and experience to enhance the
awareness and influence of our association. Our advocacy
efforts help build and promote the importance, integrity
and value of ISACA credentials and knowledge on a
global scale
Our goal is to make members more valued, knowledgeable and capable of illuminating opportunities, exposing risks
and revealing the road ahead for organizations all over the globe.
COBIT 5
COBIT PRODUCTS
Section: 01
COBIT 5 Online
Collaborative Environment
COBIT 5 signifies a transformation in the business view of the governance and management of enterprise IT. It accelerates the alignment of organizational strategy and IT in a way that increases value, stimulates growth and creates distinct competitive advantages, all while fortifying against threats and risks.
A consolidated, comprehensive resource, COBIT 5 embodies global thought leadership and guidance, and
is an asset that helps business, IT and governance experts around the world thrive.
COBIT 5
COBIT 5
COBIT PRODUCTS
PROFESSIONAL GUIDES
COBIT 5 Implementation
Member: US $35.00
Nonmember: US $50.00
Currently available in 8 languages
A complimentary eBook
Available in print CB5 and eBook WCB5
Member: US $35.00
Nonmember: US $150.00
Currently available in 4 languages
Available in print CB5IG and
eBook WCB5IG
ENABLER GUIDES
COBIT 5: Enabling Processes
Member: US $35.00
Nonmenber: US $135.00
Currently available in 7 languages
Available in print CB5EP and
eBook WCB5EP
Member: US $35.00
Nonmember: US $175.00
Available in print CB5IS and
eBook WCB5IS
COBIT 5
COBIT 5 Implementation
COBIT 5: Enabling Processes
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
COBIT 5
COBIT 5
INFORMATION CHAOS
WHY GOOD GOVERNANCE MAKES GOOD SENSE
6 OUT OF 10
EMPLOYEES
AGES 18-35
USE A PERSONAL
DEVICE FOR WORK
SECURITY BREACHES
75M
CYBERCRIME COSTS
US $1 TRILLION
PER YEAR
24B
MALWARE
SAMPLES
in
2012
CONNECTED
DEVICES
by
2020
DATA PROLIFERATION
112
EMAILS
PER DAY
PRIVACY REGULATIONS
COMPANIES
are at
RISK
from
SOCIAL
MEDIA
PASS
****
DOWNTIME
WORKER
RECEIVES
$380B
65
AVERAGE COST
TERABYTES
of
$5,000
COUNTRIES HAVE
THEIR OWN DATA
PROTECTION
LAWS
INFORMATION
PER YEAR
A MINUTE
FOR DOWNTIME
INCIDENTS
COST OF DISASTERS
in
2011
9.6 MILLION
PETABYTES:
business-related information
processed by the worlds computer
servers per year
Transforming Cybersecurity:
Using COBIT 5
SOURCES
http://www.isaca.org/About-ISACA/Press-room/News-Releases/2011/Pages/ISACA-Survey-Bring-Your-Own-Device-Trend-Heightens-Online-Holiday-Shopping-Risk.aspx
http://www.gsma.com/articles/gsma-announces-the-business-impact-of-connected-devices-could-be-worth-us-4-5-trillion-in-2020/22536
http://blogs.mcafee.com/mcafee-labs/mcafee-q4-threats-report-shows-malware-surpassed-75-million-samples-in-2011
http://www.radicati.com/?p=6904
http://ucsdnews.ucsd.edu/newsrel/general/04-05BusinessInformation.asp
http://www.informationweek.com/thebrainyard/news/community_management_development/231602379
http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html
http://www.mofo.com/privacy--data-security-services/
http://www.time.com/time/world/article/0,8599,2108354,00.html
http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007/
Vendor Management:
Using COBIT 5
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
10
COBIT 5
ISACA
Print CAC
Member US $35.00
Nonmember US $75.00
eBook WCAC
Nonmember US $55.00
ISACA
Print CAG
Member US $50.00
Nonmember US $100.00
eBook WCAG
Member US $30.00
Nonmember US $80.00
ISACA
Member US $75.00
Nonmember US $190.00
CB4.1
Business Benefits
Beyond IT
In todays value-driven world, decisions cant be
made in vacuums or silos. The comprehensive
nature of business is reflected in the
comprehensive nature of COBIT 5. Its globally
accepted principles, practices, analytical tools
and models are designed for business executives
as well as , and enterprises of all sizes and in
all industries can benefit. COBIT 5 addresses
the needs of business and IT stakeholders
across the enterprise and helps clarify goals for
more effective decision making. COBIT 5 helps
demonstrate that the right priorities are in place,
the right decisions are being made and risk is
being addressed. It allows enterprises to rely
on established, credible practices, rather than
reinvent the wheel. It was developed by strong
international thought leaders, and will continue
to evolve with advancements in the industry.
COBIT 5 Benefits
Enterprises of all sizes:
Maintain high-quality information to support
business decisions
Achieve strategic goals through the effective
and innovative use of IT
Achieve operational excellence through
reliable, efficient application of technology
ISACA
Member US $55.00
Nonmember US $110.00
CPS2
COBIT 5 consolidates and integrates the COBIT 4.1, Val IT 2.0 and Risk IT
frameworks and also draws significantly from BMIS and ITAF. You are invited to
review the COBIT 5 framework first at isaca.org/COBIT and if more guidance
is needed, reference the individual publications for more detail.
ISACA
Member US $55.00
Nonmember US $110.00
CBQ2
COBIT 5
COBIT Focus
11
ISACA
Print CPAM
Member US $30.00
Nonmember US $50.00
eBook WCPAM
Nonmember US $40.00
ISACA
Print CSAG
Member $25.00
Nonmember $40.00
eBook WCSAG
Nonmember US $30.00
www.isaca.org/bookreviews
ISACA
Member US $20.00
Nonmember US $40.00
CBSB2
www.isaca.org/downloads
12
ISACA
Member US $30.00
Nonmember US $70.00
SDG
COBIT Delphos
ISACA
Web Site Download EDW
Member US $2,550.00
Nonmember US $2,860.00
e-book VITF2
Member US $45.00
Nonmember US $90.00
ISACA
COBIT KP
(Knowledge Provider)
ISACA
39CR
Member US $80.00
Nonmember US $90.00
5RO
Member US $95.00
Nonmember US $105.00
RITPG
Member US $46.00
Nonmember US $115.00
e-book VITB2
Member US $25.00
Nonmember US $40.00
Meycor Products
COBIT Suite Datasec
The Meycor COBIT Suite is a complete and
integrated software for use in implementing
COBIT 4.1 as a governance of IT, IT security
or IT assurance tool. It includes five modules:
M
eycor COBIT CSA (Control Self
Assessment)
M
eycor COBIT MG (Management &
Governance)
Meycor COBIT AG (Assurance Guidelines)
ISACA
13
IT is complicated.
IT governance does
not have to be.
For more information on COBIT 5 and its family of
products, visit the ISACA
website at www.isaca.org/cobit.
Book Review
www.isaca.org/bookreviews
M
eycor COBIT Delphos (Balanced
Scorecard)
It also includes a central module that allows
for the performance of administrative and
functional tasks among different modules.
All COBIT contents are unified in a single
database shared by different modules.
www.isaca.org/downloads
14
15
Exam References
CISA PRODUCTS
CISA Review Manual 2014
EXAM REFERENCE
Section: 02
CISA
CISM
CGEIT
CRISC
Enterprises worldwide are seeking forward-thinking thought leaders with the skill to anticipate problems
and stay ahead of the curve. Having an ISACA certification announces you and your team are accomplished
individuals with an innovative point of view and up to the task to help set the enterprise up for future success.
ISACA certifications are recognized globally as the industry standard and in many cases as job prerequisites
for IT audit, assurance, control, governance, risk and security-related positions.
www.isaca.org/bookreviews
www.isaca.org/downloads
16
Exam References
Exam References
CISM PRODUCTS
CGEIT PRODUCTS
17
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
18
Exam References
Exam References
CRISC PRODUCTS
CRISC Review Manual 2014
TM
19
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
20
21
Non-English Resources
ESPAOL
Manual de Preparacin al
Examen CISA 2014
NON-ENGLISH RESOURCES
Section: 03
SPANISH
CHINESE
FRENCH
ITALIAN
JAPANESE
ARABIC
GERMAN
HEBREW
LITHUANIAN
ROMANIAN
RUSSIAN
THAI
TURKISH
Information is todays currency. Yet the complexity of the business and technology environments continues
to grow, with increasing legal and regulatory requirements, as well as more diverse and sophisticated
security threats. As enterprises are faced with massive volumes of data, tightening privacy restrictions and
a tangle of regulations, maximizing the value of an enterprises information and technology becomes a daily
challenge. ISACA can help.
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
22
Non-English Resources
ESPAOL (Continuado)
Manual de Preguntas, Respuestas y
Explicaciones de Preparacin al
Examen CISA 2013
Non-English Resources
ESPAOL (Continuado)
Manual de Preparacin al
Examen CISM 2014
23
Controles estratgicos y
operacionales de la TI
John Kyriazogloul
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
24
Non-English Resources
COBIT 5 Implementation
Non-English Resources
CHINESE
ESPAOL (Continuado)
COBIT 5 Framework
25
2014 CISA
105
135
CRM14C
2014 CISA
CISA
CISA
40
60
QAE14CS
2013 CISA
100
130
QAE13C
2013 CISA
CISA
CISA
40
60
QAE13CS
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
26
Non-English Resources
CHINESE (Continued)
COBIT 5 Framework
COBIT 5IT
COBIT 5IT
100
130
CB5C
COBIT 5 PDF
ISACA
COBIT 5 COBIT 5
COBIT 5
35
135
CB5EPC
27
Non-English Resources
FRANAIS
COBIT 5 Implementation
COBIT 5 PDF
ISACA
COBT 5
IT
IT
IT
IT
35
150
CB5IGC
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
28
Non-English Resources
ITALIAN
Manuale Tecnico CISA 2014
29
Non-English Resources
ITALIAN (Continued)
JAPANESE
2014
(CISA
2014(CISA)
CISACISA
IS
: US $105.00
: US $135.00
CRM14J
2013CISA&
2013CISA
CISA
950
2011CISA
20112012CISA
()
2011CISA
CISA
CISA
2014CISA
2013CISA
2014
CISA
: US $100.00
: US $130.00
QAE13J
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
30
Non-English Resources
JAPANESE(Continued)
2014CISA
2014CISA &
(CISA
100
CISA
2014CISA
2013CISA
: US $40.00
: US $60.00
QAE14JS
2013CISA&
)
2013CISA
) CISA
100
CISA
2014CISA
2013CISA
31
Non-English Resources
JAPANESE(Continued)
2012
(CISM)
2012CISMCISM
10
: US $85.00
: US $115.00
COBIT 5
35.00 US
135.00 US
CB5EPG
CM12J
COBIT 5 Implementation
COBIT 5: ImplementationISACA
PDF
COBIT 5 IT
IT
IT (GEIT)
COBIT 5 Framework
COBIT 5IT
COBIT 5
7
COBIT 5IT
: US $35.00
: US $50.00
CB5J
35.00 US
150.00 US
CB3IGJ
: US $40.00
: US $60.00
QAE13JS
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
32
Non-English Resources
Non-English Resources
ARABIC
GERMAN
HEBREW
LITHUANIAN
COBIT 5 Framework
COBIT 5 Framework
COBIT 5
COBIT 5 Framework
, , /
. COBIT
,
-21. COBIT 5
, , ,
,
.
5
.
.
.
.
)(
: US $35.00
: US $50.00
CB5AR
33
COBIT 5
.
COBIT 5
.
: US $40.00
: US $60.00
CB5H
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
34
Non-English Resources
Non-English Resources
ROMANIAN
RUSSIAN
THAI
TURKISH
COBIT 5 Framework
COBIT 5 Framework
COBIT 5 Framework
/
COBIT
21 COBIT 5
COBIT 5 -
.
COBIT 5
,
. COBIT 5
,
.
, ,
,
,
,
.
:
US $ 35.00,
:
US $ 50.00.
CB5RU
35
COBIT 5
5
COBIT 5
7
: US $35.00
: US $50.00
eBook
CB5TH
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
36
37
RISK Related
RISK RELATED
Section: 04
Douglas W. Hubbard
Member: US $50.00
Nonmember: US $60.00
78WRM
Member: US $104.00
Nonmember: US $114.00
84WRM
In business today, strong support from IS/IT is an indispensable component of any company, and can be what
separates good companies from great ones. Business leaders know that its not technology per se but the
ability to use it wisely that counts. Helping businesses make that transition requires more than just problem
solvers. ISACA invests in research that grows knowledge and results in the development of innovative
thinking that security professionals can leverage in their everyday functions and strategies for the future.
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
38
RISK Related
RISK Related
Brian Barnier
Member: US $53.00
Nonmember: US $63.00
1HOP
1
0
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
39
Member: US $35.00
Nonmember: US $45.00
2HBS
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1
0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1
1 0
0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1
1
1 1 0
0 1 0
0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0
0 0 1
1 0 1
0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1
1 1
0 1 0
1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 $1 1 0 1
C-LEVEL EXECUTIVES
0 0 1
1 0 1
0 1who 0say that
1 customer
0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 PER
0 RECORD
0 1 0
$
1 1 0
0 1 0
1 0 satisfaction
1 0 1is very
0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 Cost
0 when
1 data
1 breach
0 1
0 0 1
1 0 1
0 1 much
0 affected
1 0 by1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 caused
1 by
0 hacker
0 1or other
0
cybercriminal
IT
risk
1 1due 0
0 1 0
1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1
Annual losses
0 0 1
1 0 1
0 1 0 1 0 1 0 1 0 0 1 0 1 0 RISK
1 0SCENARIO
1 0 0 1 0 1 0 1 0 1 0 0 1 0
to cybercrime
Auditors with
1
0
1 1 0
0
1
0
1
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
1
0
1
categories addressed in
NO PLANS TO INCLUDE
0 1 0 0 1
1SOCIAL
0 MEDIA
1
0
1 0 1 0 1 0 0 1 0 1 0 1COBIT
0 51for Risk
0 0 1 0 1 0 1 0 1 0 0 1 0
RISK
0 1 0 1 1 0
0 1 in audits
0
1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1
1 0 1 0 0 1
1 0 1
0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0
0 1
0 1 0 1 1 0
1 0 1 0 1$ 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1
0 1 0
1 0 1 0 0 1
1
1 0 1 0 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0
0
0 1 0 1 1 0
0 1 0
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1
1 0 1 +0 0 1
0
1 0 1
1 0 Amount
1 0 at1risk 0for every
0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0
$1 billion that
0 1 0 1 1 0
1
0 1 0
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1
companies spend
1 0 PER1 WEEK
0
0 0 1
1 0 1
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0Ranking
1 of
0 FAILURE
1 0 0 1 0
Average number of
0 1 0 1 1FRAUD
0
1 0 1 0 1 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 TO
0 INNOVATE
1 0 1 1 0 1
EMPLOYEE-RELATED
on
Top
10
Global
1 incidents
0 1 in0 past0 1
0 1 0 1 0 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1
1 1 0
0 1 0 1 0 1 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 Risk
1 list0 1 1 0 1 0 1 0 1 12 0months
0 1 500
0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
1 0 1 FORTUNE
1 0 EXECUTIVES
1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
0 1 CHIEF
0 AUDIT
with no plans to increase
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
focus on IT
0
0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
0 Reputational
1 0 1 0 0 1
1 0 1 0 1 0 0 1 The0Economic
1 Impact
0 of1Cyber 0Crime 1and Cyber
0 Espionage,
0 1Center0for Strategic
1 0and International
1 0 Studies,
1 July0 2013.02013 Cost
1 of 0Data Breach
1 Study:
0 Global
1 Analysis,
0 1 Ponemon
0 Institute,
0 May
1 2013.
0 20121 IBM Global
1 2013,
0 1 1 0 Risk1and IT0Study.1The Risk
0 Aon1Risk 0 1 1 0
0 1 0 1 SOURCES:
0 of Insider
1 Fraud,
0 Ponemon
1 1Institute,
0 February
1 2013.
0 Pulse
1 of the
0 Profession,
1 0IIA, 2013.
1 20131Internal
0 Audit1Capabilities
0 1and Needs
0 Survey
1 Report,
0 Protiviti.
1 1Global 0Risk Management
1 0 Survey
Solutions. 2013 Pulse of the Profession, Project Management Institute, March 2013. COBIT 5 for Risk, ISACA, 2013.
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0
1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1
0 1
0
1 0 1 0
1 0
0 1
0 1
1 0 1 0
0 1
1 0 1 0
0 1
1 0 1 0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
Failing to include technology risk in enterprise risk can have major impact
46%
157
20
45%
100
1
0
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
BILLION
135
MILLION
#6
62%
ISACA Published
White Papers
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
Advanced Persistent
Threat Awareness Study
Results
Big Data: Impacts and
Benefits
Business Continuity
Management: Emerging
Trends
Security As A Service
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
40
ISACAs diverse library of audit/assurance programs includes a wide range of topics focused on
a boundless mix of interests, talents and experiences. ISACA Audit/Assurance programs provide
a globally tested approach for balancing risk, value and the use of resources. It helps leaders
deliver on their business strategy through effective information and technology execution.
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
42
Member: US $100.00
Nonmember: US $110.00
48CRC
Member: US $50.00
Nonmember: US $60.00
76WSL
43
Essentials
David G. Hill
David Coderre
Member: US $237.00
Nonmember: US $247.00
93WAAS
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
44
ESSENTIALS (Continued)
Essentials
ESSENTIALS (Continued)
Tracy Coenen
Information Technology
Control and Audit, 4th Edition
45
Steven Collings
Robert Moeller
When it comes to computer security, the role of
auditors today has never been more crucial. Auditors
must ensure that all computers, in particular those
dealing with e-business, are secure. The only source for
information on the combined areas of computer audit,
control and security, the book describes the types of
internal controls, security and integrity procedures
that management must build into its automated
systems. This timely book provides auditors with the
guidance they need to ensure that their systems are
secure from both internal and external threats.
Member: US $90.00
Nonmember: US $100.00
90WACS
Member: US $90.00
Nonmember: US $100.00
4CRC4
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
46
47
ESSENTIALS (Continued)
IT Control Objectives for Basel II:
The Importance of Governance and Risk
Management for Compliance
ISACA
IT Security Metrics:
A Practical Framework for Measuring
Security & Protecting Data Lance Hayden
Lance Hayden
IT Security Metrics provides a comprehensive approach
to measuring risks, threats, operational activities and
the effectiveness of data protection in your organization.
The book explains how to choose and design effective
measurement strategies and addresses the
data requirements of those strategies.
Member: US $50.00
Nonmember: US $60.00
22MSM
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
48
49
The revised and expanded second edition of this bestselling book describes all requirements, basic principles
and best practices of security for an SAP system.
Readers learn how to protect each SAP component
internally and externally while also complying with legal
requirements. Furthermore, the book describes how to
master the interaction of these requirements to provide
a holistic security and risk management solution. Using
numerous examples and step-by-step
instructions, this book teaches the reader
the technical details of implementing
security in SAP NetWeaver.
Member: US $70.00
Nonmember: US $80.00
2SAPP
Serves
Includes
Member: US $95.00
Nonmember: US $105.00
53WAG2
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
50
Identity Management:
Concepts, Technologies, and Systems
Elisa Bertino and Kenji Takahashi
51
Specific Environments
Member: US $60.00
Nonmember: US $75.00
1SOA3
Member: US $65.00
Nonmember: US $80.00
ISPS3
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
52
53
Member: US $72.00
Nonmember: US $77.00
3JBSS2
Member: US $73.00
Nonmember: US $83.00
16IT
Michael G. Solomon
Member: US $60.00
Nonmember: US $75.00
ISAP3
Book Review
www.isaca.org/bookreviews
Tyler Wrightson
Member: US $40.00
Nonmember: US $50.00
30MWNS
Member Complimentary PDF Download
www.isaca.org/downloads
ISACA keeps security professionals ahead of the curve on best practices, emerging trends, potential
threats and fresh insightsmaking them more skilled, successful and prepared for the challenges of
the fast-changing world of information security.
Just as information security is evolving every day, so is ISACA to keep a focus on security issues
relevant to today and the future and to inspire and equip leaders in information security to be prepared,
skilled and successful than anyone else. Our robust library of topics creates new avenues to drive
enterprise
and enhance your career.
Book
Review value
www.isaca.org/bookreviews
Member Complimentary PDF Download
www.isaca.org/downloads
54
Cybersecurity:
The Essential Body of Knowledge
Member: US $84.00
Nonmember: US $94.00
45CRC
Member: US $97.00
Nonmember: US $107.00
10IT
55
Hacking Exposed 7:
Network Security Secrets & Solutions
Member: US $60.00
Nonmember: US $70.00
4MGH3
Member: US $50.00
Nonmember: US $60.00
2MCG7
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
56
Book Review
www.isaca.org/bookreviews
57
Eric Cole
Information Security:
The Complete Reference, 2nd Edition
Mark Rhodes-Ousley
www.isaca.org/downloads
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
58
Member: US $40.00
Nonmember: US $50.00
29MWAS
59
Book Review
www.isaca.org/bookreviews
Member: US $70.00
Nonmember: US $80.00
55CRC
www.isaca.org/downloads
60
Lee Newcombe
Steven DeFino
Member: US $40.00
Nonmember: US $50.00
15IT
61
Book Review
www.isaca.org/bookreviews
Todd Fitzgerald
Member: US $80.00
Nonmember: US $90.00
54CRC
www.isaca.org/downloads
62
63
IT GOVERNANCE AND
BUSINESS MANAGEMENT
Section: 07
Member: US $16.00
Nonmember: US $26.00
1HMBD
The complexity of the IT environment continues to grow, with increasing legal and regulatory
requirements, as well as more diverse and sophisticated security threats. IT has emerged as a core
strategic imperative that can differentiate and organization from its competitors. Browse our library of
Governance and Management titles developed to help you bring order to the growing complexity of IT.
ISACA develops and delivers industry-renowned, research, publications and business frameworks.
We equip and inspire individuals to be leaders in the fast changing world of information systems,
information technology and business. ISACA inspires and equips individuals to be more capable, valued
and successful in the fast-changing world of information systems, information technology and business.
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
64
IT Governance and
Business Management
An Executive Guide to IFRS:
Content, Costs and Benefits to Business
Peter Walton
IT Governance and
Business Management
CIO Best Practices: Enabling Strategic
Value With Information Technology,
2nd Edition
Joseph P. Stenzel, Gary Cokins, Karl D. Schubert,
and Michael H. Hugos
Member: US $40.00
Nonmember: US $50.00
94WIFRS
Member: US $70.00
Nonmember: US $80.00
54WCIO
ISACA
65
Member: US $50.00
Nonmember: US $60.00
89WEG
Member: US $45.00
Nonmember: US $60.00
Available in print BMIS
and eBook
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
66
IT Governance and
Business Management
IT Governance and
Business Management
Stephen Pedneault
Member: US $60.00
Nonmember: US $70.00
85WF101
Member: US $50.00
Nonmember: US $60.00
20MHE
Anthony Tarantino
Zachary Wong
Member: US $163.00
Nonmember: US $173.00
64WGRC
67
Member: US $55.00
Nonmember: US $65.00
67WHF
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
68
IT Governance and
Business Management
Information Security Governance:
Guidance for Information Security
Managers
ISACA and W. Krag Brotby
E xtensive
Member: US $795.00
Nonmember: US $805.00
1BS12
69
IT Governance and
Business Management
Information Security Roles &
Responsibilities Made Easy, Version V3
Charles Cresson Wood
Member: US $195.00
Nonmember: US $205.00
3IGI
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
70
IT Governance and
Business Management
WWW.ISACA.ORG/COBIT5INFO-SEC
95%
$174 MILLION
13 MAJOR SECURITY
58%
39%
EMPLOYEE
NEGLIGENCE
49
70%
VULNERABILITES
IN 2011
PRIVACY
EVERY 15 SECONDS
FLAME SPYWARE GRABS A
SCREEN IMAGE ON A
COMPROMISED PC
BUSINESS CONTINUITY
COMPLIANCE
COST OF
COMPLIANCE
NON-COMPLIANCE
+
$5,000/
MINUTE
AVERAGE COST
OF DATA
CENTER
$222
37
OF SMBS MOTIVATED BY
DISASTER PREPAREDNESS TO
MOVE TO PRIVATE CLOUD
COMPUTING
DOWNTIME
$820
PER EMPLOYEE
HIPPA
PER EMPLOYEE
DODD-FRANK
EUROPE DATA PROTECTION DIRECTIVE
PERSONAL INFORMATION PROTECTION LAW
14,215
71
Member: US $15.00
Nonmember: US $25.00
8ITHP
IT Outsourcing Contracts:
A Legal and Practical Guide (Pocket Guide)
Jimmy Desai
IT Outsourcing:
Part 1 Contracting the Partner
Denis Verhoef and Gerard Wijers
SOURCES
Ponemon Institute 2011 Cost of Data Breach Study: United States
Verizon 2012 Data Breach Investigations Report
Reuters, http://reut.rs/zzrcec
Symantec Internal Threat Report 17
WIRED, http://www.wired.com/threatlevel/2012/05/flame/all/1
European Commission-Justice, Data Protection
Ponemon Institute Second Annual Benchmark Study on Patient
Privacy and Data Security
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
72
IT Governance and
Business Management
IT Governance and
Business Management
IT Project Management:
30 Steps to Success
IT Project Management:
On Track From Start to Finish, 3rd Edition
Premanand Doraiswamy
Joseph Phillips
Member: US $52.00
Nonmember: US $62.00
25MIPM
Member: US $15.00
Nonmember: US $25.00
12ITPM
73
Member: US $22.00
Nonmember: US $32.00
9VH
ISACA
A Practical Guide to
Reducing IT Costs
Member: US $60.00
Nonmember: US $70.00
26MDM
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
74
IT Governance and
Business Management
Swanson on Internal Auditing:
Raising the Bar
Dan Swanson
75
IT Governance and
Business Management
The Service Catalog
Mark OLoughlin
Assist
Assist
Assist
Member: US $7.00
Nonmember: US $7.00
4ITG
Sam Bansal
Book Review
www.isaca.org/bookreviews
www.isaca.org/downloads
76
IT Governance and
Business Management
IT Governance and
Business Management
Member: US $13.00
Nonmember: US $23.00
1CSITG
Member: US $97.00
Nonmember: US $107.00
15ITIP
Brynn TT Phillips
Illustrating Prince2:
Project Management in Real Terms
77
Ralph Langner
Stephen Page
Member: US $20.00
Nonmember: US $30.00
3PAGE
Susan Tuttle
www.isaca.org/bookreviews
www.isaca.org/downloads
78
Inventory Reduction
Sale Listing
RISK RELATED
55WRC Risk, Control and Security:
Concepts and Application
5PL
INVENTORY REDUCTION
SALE LISTING
Section: 08
SAVE
RISK RELATED
40-50%
AUDIT, CONTROL AND SECURITY
ESSENTIALS
AUDIT, CONTROL AND SECURITY
SPECIFIC ENVIRONMENTS
Nonmember
$70.00
$75.00
$64.00
$69.00
19-CRC
$46.00
$51.00
4IGI
$40.00
$45.00
$62.00
$67.00
$50.00
$55.00
$110.00
$115.00
$20.00
$25.00
$45.00
$50.00
$65.00
$70.00
1-IGI
$75.00
$80.00
6PL
Auditing IT Infrastructures
$64.00
$69.00
$70.00
$75.00
$30.00
$35.00
7ART
$65.00
$70.00
$64.00
$69.00
$25.00
$30.00
Member
Nonmember
$50.00
$55.00
5IGI
PLIN
$18.00
$23.00
4DC
$45.00
$50.00
PW
$20.00
$25.00
IT GOVERNANCE AND
BUSINESS MANAGEMENT
Books offered in the ISACA Bookstore
Special Sale may contain dated
material, overall these books are still
of value. Sale prices effective while
quantities are available.
Get access to cutting-edge, front-line perspectives on emerging trends, developing risks and
professional development. Stay up to date on the latest industry topics and gain unique insights from
the industrys most innovative thought leaders.
Nonmember
Deterrence
Save on ISACA exam study aids, and receive discounted IT industry publications. Equip yourself with
knowledge critical to thinking strategically and navigating todays complex IT issues. From surveys and
whitepapers to frameworks, standards and research publications, ISACA has what you need.
Member
Management: Storing,
Managing, and Protecting
Digital Information
8-ART
8PL
2BAY
79
80
Inventory Reduction
Sale Listing
INTERNET AND RELATED SECURITY TOPICS
Nonmember
$30.00
$35.00
$12.00
$17.00
2SCC
Cybercrimes: A
Multidisciplinary Analysis
$115.00
$120.00
Network Security
Fundamentals
$45.00
59WNS
Measures: Understanding
the Increasing Problem of
Electronic Identify Theft
$60.00
$55.00
$50.00
$65.00
$60.00
1HA
$15.00
$20.00
6-EL
$43.00
$48.00
$18.00
$23.00
29ST3
11EL
Cyber Attacks:
Protecting National
Infrastructure
Inventory Reduction
Sale Listing
IT GOVERNANCE AND BUSINESS MANAGEMENT
Member
Member
Nonmember
$60.00
$65.00
$105.00
$110.00
$140.00
Enterprise Information
Security and Privacy
$60.00
$40.00
1-DR
2-IGI
9ART
1JR
Information Technology
2nd Edition
$40.00
$25.00
$45.00
81
Information Security
Nonmember
$85.00
$90.00
3VH
$33.00
$37.00
$39.00
$44.00
$45.00
$50.00
8-VH
$145.00
in a Sarbanes-Oxley World
$42.00
$65.00
$45.00
$47.00
$50.00
$62.00
$67.00
Information Security
Harmonization: Classification
of Global Guidance
$25.00
$258.00
$15.00
$20.00
$5.00
$5.00
5-ID
IT Portfolio Management
WSH
$235.00
6-VH
6-ART
$3.00
$95.00
$40.00
$3.00
1IS
$90.00
$35.00
Information Security
Governance: Guidance for
Boards of Directors and
Executive Management, 2nd
Edition
$60.00
$20.00
IT Financial Management
2ITG
$55.00
$15.00
12VH
$35.00
$130.00
$30.00
$60.00
1IBM
$125.00
Information Security
Governance: Guidance
for Information Security
Managers
$55.00
$35.00
Information Technology
Ethics: Cultural Perspectives
3ITG
$30.00
3-ID
$51.00
6RO
7ITGR
$46.00
$48.00
$65.00
$55.00
Frameworks for IT
Management
$43.00
$60.00
Nonmember
5-SYN Sarbanes-Oxley IT
Green IT in Practice
IT Service Management
Global Best Practices
Member
$45.00
Enterprise
1ITG
$35.00
$40.00
$54.00
$59.00
$155.00
$160.00
Book Review
$40.00
www.isaca.org/bookreviews
Board Briefing on IT
Governance, 2nd Edition
www.isaca.org/downloads
82
83
Title Index
Symbols
G
Global Perspectives in Information Security ....................................80
Governance, Risk and Compliance Handbook: Technology, Finance,
Environmental, and International Guidance and Best Practices .66
Gray Hat Hacking: The Ethical Hackers Handbook, 3rd Edition .55
Green IT in Practice ....................................................................................80
H
Hacking Exposed 7: Network Security Secrets & Solutions ........55
Hacking Exposed Malware and Rootkits: Malware & Rootkits
Secrets & Solutions .............................................................................66
Hacking Exposed Web Applications, 3rd Edition ............................55
Hacking Exposed Wireless: Wireless Security Secrets & Solutions,
2nd Edition ............................................................................................55
Healthcare Fraud: Auditing and Detection Guide ..........................79
Honeypots: A New Paradigm to Information Security .................56
How to Complete a Risk Assessment in 5 Days or Less Thomas R. Peltier
7 .
3
Human Factors in Project Management: Concepts,Tools, andTechniques
for Inspiring Teamwork and Motivation .....................................66
84
Title Index
Information Technology for Management: Improving Strategic and
Operational Performance, 8th Edition ........................................69
Information Technology Governance and Service Management:
Frameworks and Adaptations ........................................................68
Information Technology Risk Management in Enterprise Environments
7 .
3
Interpretation and Application of International Standards on Auditing
5 .
4
Introduction to Healthcare Information Technology, 1st Edition . . 52
IT Assurance Guide: Using COBIT .......................................................11
IT Audit, Control, and Security ...............................................................45
IT Auditing: The Process ...........................................................................79
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
5.
4
IT Control Objectives for Basel II: The Importance of Governance and Risk
Management for Compliance ........................................................46
IT Control Objectives for Cloud Computing: Controls and Assurance
in the Cloud ...........................................................................................46
IT Control Objectives for Cloud Computing: Controls and Assurance
in the Cloud (Italian) ..........................................................................29
IT Financial Management ........................................................................80
IT Governance and Process Maturity ...................................................71
IT Governance: A Pocket Guide .............................................................69
IT Governance for CEOs and Members of the Board .....................76
IT Governance: Policies & Procedures, 2014 Editio .........................69
IT Governance to Drive High Performance: Lessons From Accenture 1.
7
IT Outsourcing Contracts: A Legal and Practical Guide (Pocket Guide)
1 .
7
IT Outsourcing: Part 1 Contracting the Partner ...............................71
IT Portfolio Management ........................................................................80
IT Project Management: 30 Steps to Success ...................................72
IT Project Management: On Track From Start to Finish, 3rd Edition .72
IT Risk: Turning Business Threats Into Competitive Advantage .38
IT Security Metrics: A Practical Framework for Measuring Security &
Protecting Data Lance Hayden ......................................................46
IT Service Management Global Best Practices .................................81
IT Strategic and Operational Controls ................................................48
N
Network Security Bible, 2nd Edition ....................................................56
Network Security Fundamentals ..........................................................80
No Root for You: A Series of Tutorials, Rants and Raves, and Other
Random Nuances Therein ................................................................80
KeyPerformanceIndicators:Developing,Implementing,andUsingWinning
KPIs, 2nd Edition ..................................................................................72
Official Certified Ethical Hacker Review Guide: For Version 7.1, 1st
1 Edition
6
.
OncemoretheBreach:ManaginginformationSecurityinanUncertainWorld49
Outsourcing IT: A Governance Guide ..................................................73
M
Making IT Governance Work in a Sarbanes-Oxley World .............81
Managers Guide to ComplianceSarbanes-Oxley, COSO, ERM, COBIT,
IFRS, BASEL II, OMBs A-123, ASX 10, OECD Principles, Turnbull
Guidance, Best Practices, and Case Studies ...............................81
Manual de Preguntas, Respuestas y Explicaciones de Preparacin
al Examen CISA 2013 .......................................................................22
R
Responding to Targeted Cyberattacks ...............................................60
Reverse Deception: Organized Cyber Threat Counter Exploitation . . 60
Risk, Control and Security: Concepts and Application .................79
Risk Management Approach to Business Continuity: Aligning Business
Continuity With Corporate Governance .....................................13
Risk Management & Risk Assessment .................................................79
Robust Control System Networks: How to Achieve Reliable Control . 76
Role Engineering for Enterprise Security Management ...............79
S
Safeguarding Critical E-Documents: Implementing a Program for
Securing Confidential Information Assets .................................77
SAP Security and Risk Management, 2nd Edition ..........................48
Sarbanes-Oxley IT Compliance Using Open Source Tools, 2nd Editions 1.
8
Scrappy Information Security ................................................................80
Securing Cloud Services: A pragmatic guide to security architecture
in the Cloud ...........................................................................................60
Securing Converged IP Networks .........................................................80
Securing Mobile Devices: Using COBIT 5 for Information Security . . . . . 9
Securing the Clicks: Network Security in the Age of Social Media . . . 58
Securing the Information Infrastructure ............................................79
Security, Audit and Control Features Oracle Database, 3rd Edition . 50
Security, Audit and Control Features Oracle E-Business Suite, 3rd Edition
1 .
5
Security, Audit and Control Features Oracle PeopleSoft, 3rd Edition* .51
Security Audit and Control Features SAP ERP, 3rd Edition ..........52
Security Awareness: Best Practices to Secure Your Enterprise ...81
Security Considerations for Cloud Computing ...............................58
Security Information and Event Management (SIEM) Implementation .58
Security Metrics: A Beginners Guide ..................................................49
Security, Strategies in Windows Platform and Applications, Second2Edition
5
.
Service Oriented Architecture: A Planning and Implementation Guide for
Business and Technology .................................................................81
Service Oriented Architecture Field Guide for Executives ...........81
SharePoint Deployment Governance Using COBIT 4.1:
A Practical Approach .........................................................................12
Six Sigma for IT Management ................................................................81
SOC 2: A User Guide ..................................................................................49
Social and Human Elements of Information Security: Emerging Trends
and Countermeasures .......................................................................81
Stepping Through the InfoSec Program ............................................79
Swanson on Internal Auditing: Raising the Bar ...............................74
System Forensics, Investigation, and Response ..............................58
T
Technology Scorecards: Aligning IT Investments With Business
Performance .........................................................................................74
The Big Switch: Rewiring the World, from Edison to Google .....80
The Business Case Guide Using Val IT 2.0 .....................................12
U
Unlocking Value: An Executive Primer on the Critical Role of IT
Governance ISACA ..............................................................................75
V
Visible Ops Security: Achieving Common Security and IT Operations
Objectives in 4 Practical Steps ........................................................75
W
Web Application Security: A Beginners Guide ...............................59
Wireless network Security A beginners Guide ................................52
World Class IT: Why Businesses Succeed When IT Triumphs ......75
X
XSS Exploits-Cross Site Scripting Attacks and Defense ................80
85
86
@ISACANews
facebook.com/ISACAHQ
linkedin.com/groups/ISACA-Official-3839870
www.isaca.org