The primary purpose of computer forensics is to enable organisations to pinpoint where the malware has infected their computer systems and which files have been infected, so that they can close the vulnerability. More and more organisations have realised that they need to acquire a forensic capability to ensure they are ready to cope with an information security incident. This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight...
The primary purpose of computer forensics is to enable organisations to pinpoint where the malware has infected their computer systems and which files...
This is a unique practical digest for managers and professionals who need to know the whole story.
It delivers "how to do BCM in the most effective way," whether to do it and the difference it really makes to corporate governance, corporate social responsibility and directors' contingent liabilities.
This comprehensive guide deals with all aspects of "best practice" in business resilience, including current issues like choosing software, national and international standards, and even sustainability!
Readers won't be missing out on any significantly different thinking and will know...
This is a unique practical digest for managers and professionals who need to know the whole story.
It delivers "how to do BCM in the most effectiv...
Protect your organisation's information assets using ISO27001:2013 Information is one of your organisation's most important resources. Keeping that information secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it. Furthering the objectives of your organisation Information...
Protect your organisation's information assets using ISO27001:2013 Information is one of your organisation's most important resources. Keeping that in...
The Agile auditing challenge Many auditors are now encountering Agile management methodologies for the first time. In some cases, this can cause problems for the audit process because the methodology is very different from traditional approaches. Aside from the difficulties faced by the auditor, an ineffective audit can have a negative effect on an Agile project by giving a false impression of its progress. It might even harm the final project outcome. Bridging the gap between Agile teams and Auditors Written for auditors and Agile managers, Agile Governance and Audit bridges the gap between...
The Agile auditing challenge Many auditors are now encountering Agile management methodologies for the first time. In some cases, this can cause probl...