Five cyber security books you can’t miss in 2015

Data breaches and cyber security incidents continue to hit the headlines, so it’s unsurprising that there’s a need for more awareness, understanding and knowledge of the various issues and factors that impact on cyber security and how to tackle them.

Acknowledging this need for new insights and guidance, our publishing imprint, IT Governance Publishing (ITGP), has been busy bringing new titles to the market to help IT professionals and senior executives better understand the changing cyber threat landscape.

Here is a quick overview of some of ITGP’s new releases that are available in multiple formats including softcover, Adobe eBook, Kindle and ePub. Make sure you get your copy today!

Build a Security CultureBuild a Security Culture

Human behaviour is complex and inconsistent, making it a rich hunting ground for would-be hackers and a significant risk to the security of your organisation. This book addresses the human and cultural factors in organisational security, and explains how to manage related threats by implementing an effective framework for an organisational culture, ensuring that organisations are set up to repel malicious intrusions and threats based on common human vulnerabilities.

Web Application Security is a StackWeb Application Security is a Stack

This book is an ideal companion for application developers, system administrators and network professionals who need a comprehensive top-level view of web application security to better defend and protect both the ‘web’ and the ‘application’ against potential attacks. It examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them.

Reviewing IT in Due DiligenceReviewing IT in Due Diligence

In a world of increasing cyber attacks and information security threats, it can be a very risky mistake to overlook the IT systems and services of the businesses that you are acquiring. This book provides an introduction to information risk management (IRM) in due diligence, and outlines some of the key IT issues to consider as part of the due diligence process.

Managing Information Security BreachesManaging Information Security Breaches – Studies from Real Life, 2nd Edition

Even when organisations take precautions, they may still be at risk of a data breach. This book provides a general discussion of what information security breaches are, how they can be treated, and what ISO 27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches.

Data Protection and the CloudData Protection and the Cloud

More than 85% of businesses now take advantage of Cloud computing, but Cloud computing can be a challenge when complying with data protection legislation. This pocket guide provides an expert introduction to the use of Cloud services while meeting an organisation’s data protection obligations. It highlights the risks an organisation’s use of the Cloud might generate, and offers the kind of remedial measures that could be taken to mitigate those risks.

Visit our webshop for a greater selection of reading and other resources.

Share now…

Share on Twitter Share on Facebook Share on LinkedIn