https://www.itgovernance.co.uk
| Content Type | OA ? | PCA ? | 
|---|---|---|
| Books (Back List, Front List) | No | Yes | 
| Titles (286) | Information | 
|---|---|
| 21st Century Chinese Cyberwarfare | Author/Editor: WILLIAM T. HAGESTAD II | 
| 30 Key Questions that Unlock Management | Author/Editor: BRIAN SUTTON,ROBINA CHATHAM | 
| 50 Top IT Project Management Challenges | Author/Editor: PREMANAND DORAISWAMY,PREMI SHIV | 
| Above the Clouds: Managing Risk in the World of Cloud Computing | Author/Editor: KEVIN T. MCDONALD | 
| Agile: An Executive Guide: Real results from IT budgets | Author/Editor: JAMIE LYNN COOKE | 
| Agile: An Executive Guide: Real results from IT budgets, Ed. 2 | Author/Editor: JAMIE LYNN COOKE | 
| Agile Governance and Audit: An overview for auditors and agile teams | Author/Editor: CHRISTOPHER WRIGHT | 
| Agile Principles Unleashed: Proven approaches for achieving real productivity gains in any organisation | Author/Editor: JAMIE LYNN COOKE | 
| Agile Productivity Unleashed: Proven approaches for achieving real productivity gains in any organization | Author/Editor: JAMIE LYNN COOKE | 
| Agile Productivity Unleashed: Proven approaches for achieving productivity gains in any organisation, Ed. 2 | Author/Editor: JAMIE LYNN COOKE | 
| Agile Project Management, Assurance and Auditing: A practical guide for auditors, reviewers and project teams | Author/Editor: CHRISTOPHER WRIGHT | 
| Agile SAP: Introducing flexibility, transparency and speed to SAP implementations | Author/Editor: SEAN ROBSON | 
| Allyship Actually: Why it’s ‘We’ and not ‘Me’ | Author/Editor: LUCY GRIMWADE ,DAVID BARROW | 
| Application security in the ISO27001:2013 Environment, Ed. 2 | Author/Editor: VINOD VASUDEVAN,ANOOP MANGLA,FIROSH UMMER,SACHIN SHETTY,SANGITA PAKALA,SIDDHARTH ANBALAHAN | 
| Application security in the ISO27001 Environment | Author/Editor: VINOD VASUDEVAN,ANOOP MANGLA,FIROSH UMMER,SACHIN SHETTY,SANGITA PAKALA,SIDDHARTH ANBALAHAN | 
| Artificial Intelligence: Ethical, Social and Security Impacts for the Present and the Future | Author/Editor: JULIE E. MEHAN | 
| Artificial Intelligence: Ethical, social, and security impacts for the present and the future, Second edition | Author/Editor: JULIE E. MEHAN | 
| The Art of Cyber Security: A practical guide to winning the war on cyber crime | Author/Editor: GARY HIBBERD | 
| Assessing Information Security: Strategies, Tactics, Logic and Framework | Author/Editor: A VLADIMIROV,K GAVRILENKO,A MICHAJLOWSKI | 
| Assessing Information Security: Strategies, Tactics, Logic and Framewortk, Ed. 2 | Author/Editor: A VLADIMIROV,K GAVRILENKO,A MICHAJLOWSKI | 
| Assessing Information Security: Strategies, Tactics, Logic and Framework, Ed. 2 | Author/Editor: A VLADIMIROV ,K GAVRILENKO ,A MICHAJLOWSKI | 
| Assessing IT Projects to Ensure Successful Outcomes | Author/Editor: KERRY R. WILLS | 
| Availability and Capacity Management in the Cloud: An ITSM Narrative Account | Author/Editor: DANIEL McLEAN | 
| Breaking the Addiction to Process: An Introduction to Agile Project Management | Author/Editor: ELIZABETH SCANLON THOMAS | 
| Build a Security Culture | Author/Editor: KAI ROER | 
| Building a High-Performance Team: Proven techniques for effective team working | Author/Editor: SARAH COOK | 
| Business Continuity and the Pandemic Threat | Author/Editor: ROBERT A. CLARK | 
| Business Continuity and the Pandemic Threat - Learning from COVID-19 while preparing for the next pandemic | Author/Editor: ROBERT A. CLARK | 
| Business Continuity Management: Choosing to Survive | Author/Editor: ABDULLAH AL HOUR | 
| Business Management Controls: A guide | Author/Editor: JOHN KYRIAZOGLOU | 
| The California Consumer Privacy Act (CCPA): An implementation guide | Author/Editor: PRESTON BUKATY | 
| The California Privacy Rights Act (CPRA) – An implementation and compliance guide | Author/Editor: PRESTON BUKATY | 
| The Case for ISO27001:2013, Ed. 2 | Author/Editor: ALAN CALDER | 
| Catalogs, Services and Portfolios: An ITSM success story | Author/Editor: DANIEL McLEAN | 
| Changing how you manage and communicate change: Focusing on the human side of change | Author/Editor: NAOMI KARTEN | 
| Changing the IT Leader's Mindset: Time for revolution rather than evolution | Author/Editor: ROBINA CHATHAM,BRIAN SUTTON | 
| The Chief Information Security Officer: Insights, tools and survival skills | Author/Editor: BARRY L. KOUNS,JAKE KOUNS | 
| The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape | Author/Editor: BARRY KOUNS ,JAKE KOUNS | 
| Cloud Computing: Assessing the risks | Author/Editor: JARED CARSTENSEN,BERNARD GOLDEN,JP MORGENTHAL | 
| Cloud Security and Governance: Who's on your cloud? | Author/Editor: SUMNER BLOUNT,ROB ZANELLA | 
| Coaching for High Performance: How to develop exceptional results through coaching | Author/Editor: SARAH COOK | 
| Collaborative Business Design: Improving and innovating the design of IT-driven business services | Author/Editor: BRIAN JOHNSON,LÉON-PAUL DE ROUW | 
| Collaborative Business Design: The Fundamentals | Author/Editor: Brian Johnson,Léon-Paul de Rouw | 
| Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning | Author/Editor: RICHARD BINGLEY | 
| Compliance by Design: IT controls that work | Author/Editor: CHONG EE | 
| Compliance for Green IT: A Pocket Guide | Author/Editor: ALAN CALDER | 
| Computer Forensics: A Pocket Guide | Author/Editor: NATHAN CLARKE | 
| A concise introduction to the NIS Directive: A pocket guide for digital service providers | Author/Editor: ALAN CALDER | 
| The Concise PRINCE2®: A Pocket Guide, Ed. 2 | Author/Editor: COLIN BENTLEY | 
| The Concise PRINCE2® - Principles and essential themes: Third edition, Ed. 3 | Author/Editor: COLIN BENTLEY | 
| Controles estratégicos y operacionales de la TI | Author/Editor: JOHN KYRIAZOGLOU | 
| Coping with Unplanned Absences: A Pocket Guide | Author/Editor: SARAH COOK | 
| Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications | Author/Editor: ALAN CALDER | 
| Cyber Essentials: A Pocket Guide | Author/Editor: ALAN CALDER | 
| Cyber resilience: Defence-in-depth principles | Author/Editor: ALAN CALDER | 
| The Cyber Resilience Handbook: Defend, Prepare, Survive | Author/Editor: ANDREW PATTISON | 
| Cyber Risks for Business Professionals: A Management Guide | Author/Editor: RUPERT KENDRICK | 
| Cyber Security: Essential principles to secure your organisation | Author/Editor: ALAN CALDER | 
| The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) | Author/Editor: ALAN CALDER | 
| The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide | Author/Editor: WILLIAM GAMBLE | 
| CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger | Author/Editor: JULIE E. MEHAN | 
| Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment | Author/Editor: JULIE E. MEHAN | 
| The Data Governance Imperative | Author/Editor: STEVE SARSFIELD | 
| Data Protection and the Cloud: Are the risks too great? | Author/Editor: PAUL TICHER | 
| Data Protection and the Cloud - Are you really managing the risks?: Second edition, Ed. 2 | Author/Editor: PAUL TICHER | 
| Data Protection Compliance in the UK: A Pocket Guide, Ed. 2 | Author/Editor: ROSEMARY JAY,JENNA CLARKE | 
| Data Protection vs. Freedom of Information: Access and Personal Data | Author/Editor: PAUL TICHER | 
| The Definitive Guide to IT Service Metrics | Author/Editor: KURT McWHIRTER,TED GAUGHAN | 
| The Definitive Guide to the C&A Transformation Process: The First Publication of a Comprehensive View of the C&A Transformation | Author/Editor: JULIE E. MEHAN,WAYLON KRUSH | 
| Digital Earth: Cyber threats, privacy and ethics in an age of paranoia | Author/Editor: SARAH KATZ | 
| Directing The Agile Organisation: A lean approach to business management | Author/Editor: EVAN LEYBOURN | 
| Disaster Recovery and Business Continuity 3rd edition: A Quick Guide for Small Organizations and Busy Executives | Author/Editor: THEJENDRA B.S | 
| Disaster Recovery and Business Continuity: A Quick Guide for Small Organizations and Busy Executives, Ed. 2 | Author/Editor: THEJENDRA BS | 
| DORA: A guide to the EU digital operational resilience act | Author/Editor: ANDREW PATTISON | 
| Dramatically Honest: How to own your authenticity in the workplace | Author/Editor: SOPHIE HUSSEY | 
| E-Discovery and the Federal Rules of Civil Procedures | Author/Editor: BRADLEY J SCHAUFENBUEL | 
| An Education in Service Management: A guide to building a successful service management career and delivering organisational success | Author/Editor: DAVID BARROW | 
| Effective Career Development: Advice for establishing an enjoyable career | Author/Editor: SARAH COOK | 
| The Effective Manager: Management skills for high performance | Author/Editor: SARAH COOK | 
| Email Security: A Pocket Guide | Author/Editor: STEVEN FURNELL,PAUL DOWLAND | 
| E-mail Security: A Pocket Guide | Author/Editor: STEVEN FURNELL ,PAUL DOWLAND | 
| Enterprise Architecture: A Pocket Guide | Author/Editor: TOM GRAVES | 
| Essential Time Management and Organisation: A Pocket Guide | Author/Editor: SARAH COOK | 
| Establishing an occupational health & safety management system based on ISO 45001 | Author/Editor: NAEEM SADIQ | 
| EU Code of Conduct for Cloud Service Providers: A guide to compliance | Author/Editor: ALAN CALDER | 
| The EU Data Protection Code of Conduct for Cloud Service Providers: A guide to compliance | Author/Editor: ALAN CALDER | 
| EU-DSGVO: Eine Kurzanleitung | Author/Editor: ALAN CALDER | 
| EU GDPR – An international guide to compliance | Author/Editor: ALAN CALDER | 
| EU GDPR A Pocket Guide | Author/Editor: ALAN CALDER | 
| EU GDPR: A Pocket Guide (European) | Author/Editor: ALAN CALDER | 
| EU GDPR - A Pocket Guide (European) second edition, Ed. 2 | Author/Editor: ALAN CALDER | 
| EU GDPR: A Pocket Guide, School's edition | Author/Editor: ALAN CALDER | 
| EU GDPR - A pocket guide, second edition, Ed. 2 | Author/Editor: ALAN CALDER | 
| EU GDPR & EU-US Privacy Shield: A Pocket Guide | Author/Editor: ALAN CALDER | 
| EU GDPR & EU-U.S. Privacy Shield: A pocket guide, second edition, Ed. 2 | Author/Editor: ALAN CALDER | 
| EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide |  | 
| EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide - Second edition, Ed. 2 |  | 
| EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition |  | 
| EU General Data Protection Regulation (GDPR), third edition: An Implementation and Compliance Guide, Ed. 3 |  | 
| Europrivacy™/®: The first European Data Protection Seal | Author/Editor: ALICE TURLEY | 
| Everything you want to know about Agile: How to get Agile results in a less-than-agile organization | Author/Editor: JAMIE LYNN COOKE | 
| Everything you want to know about Business Continuity | Author/Editor: TONY DREWITT | 
| Everything you want to know about Organisational Change | Author/Editor: DARREN ARCANGEL,BRIAN JOHNSON | 
| Exploding the Myths Surrounding ISO9000: A practical implementation guide | Author/Editor: ANDREW W. NICHOLS | 
| Fundamentals of Assurance for Lean Projects | Author/Editor: CHRISTOPHER WRIGHT | 
| Fundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors | Author/Editor: Christopher Wright | 
| Governance and Internal Controls for Cutting Edge IT | Author/Editor: KAREN F. WORSTELL | 
| Governance of Enterprise IT based on COBIT®5: A Management Guide | Author/Editor: GEOFF HARMER | 
| Governance of Enterprise IT based on COBIT 5: A Management Guide | Author/Editor: GEOFF HARMER | 
| The Governance of Green IT: The Role of Processes in Reducing Data Center Energy Requirements | Author/Editor: GEORGE SPAFFORD | 
| The Green Agenda: A Business Guide | Author/Editor: ALAN CALDER | 
| Greening the Data Center: A Pocket Guide | Author/Editor: GEORGE SPAFFORD | 
| Green IT in Practice: How one company is approaching the greening of its IT, Ed. 2 | Author/Editor: GARY HIRD | 
| The Green Office: A Business Guide | Author/Editor: ALAN CALDER | 
| A Guide to Effective Internal Management System Audits: Implementing internal audits as a risk management tool | Author/Editor: ANDREW W. NICHOLS | 
| How Cyber Security Can Protect Your Business: A guide for all stakeholders | Author/Editor: CHRISTOPHER WRIGHT | 
| How to Survive a Data Breach: A Pocket Guide | Author/Editor: STEWART MITCHELL | 
| The Hybrid Working Handbook: How to implement a successful flexible working model | Author/Editor: SARAH COOK | 
| Illustrating PRINCE2: Project management in real terms | Author/Editor: SUSAN TUTTLE | 
| Implementación de Calidad de Servicio basado en ISO/IEC 20000: Una Guía de Gestión | Author/Editor: MICHAEL KUNAS | 
| Implementierung von Service-Qualita basierend auf ISO/IEC 20000: Ein Management-Leitfaden | Author/Editor: MICHAEL KUNAS | 
| Implementing an Integrated Management System (IMS): The strategic approach | Author/Editor: ALAN FIELD | 
| Implementing ISO 9001:2015 – A practical guide to busting myths surrounding quality management systems | Author/Editor: ANDREW W NICHOLS | 
| Implementing Service Quality based on ISO/IEC 20000: A Management Guide, Ed. 3 | Author/Editor: MICHAEL KUNAS | 
| Information Security A Practical Guide: Bridging the gap between IT and management | Author/Editor: TOM MOONEY | 
| Information Security Breaches: Avoidance and Treatment based on ISO27001, Ed. 2 | Author/Editor: MICHAEL KRAUSZ | 
| Information Security Breaches: Avoidance and Treatment based on ISO27001 | Author/Editor: MICHAEL KRAUSZ | 
| Information Security Law: The Emerging Standard for Corporate Compliance | Author/Editor: THOMAS J. SMEDINGHOFF | 
| Information Security Risk Management for ISO27001/ISO27002 | Author/Editor: ALAN CALDER,STEVE G WATKINS | 
| Information Security Risk Management for ISO 27001/ISO 27002, third edition, Ed. 3 | Author/Editor: ALAN CALDER,STEVE G WATKINS | 
| In Hindsight: A compendium of Business Continuity case studies | Author/Editor: ROBERT A CLARK | 
| I nove passi per il successo: Compendio per l’attuazione della norma ISO 27001:2013 | Author/Editor: ALAN CALDER | 
| Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within | Author/Editor: JULIE E. MEHAN | 
| The Insider Threat: Combatting the Enemy Within | Author/Editor: CLIVE BLACKWELL | 
| Integrated Measurement - KPIs and Metrics for ITSM: A narrative account | Author/Editor: DANIEL McLEAN | 
| An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things | Author/Editor: ALAN FIELD | 
| An Introduction to Hacking and Crimeware: A Pocket Guide | Author/Editor: VICTORIA LOEWENGART | 
| An Introduction to Information Security and ISO27001:2013: A Pocket Guide, Ed. 2 | Author/Editor: STEVE G WATKINS | 
| ISO14001 Step by Step: A practical guide | Author/Editor: NAEEM SADIQ,ASIF HAYAT KHAN | 
| ISO 14001 Step by Step - A practical guide: Second edition, Ed. 2 | Author/Editor: NAEEM SADIQ,ASIF HAYAT KHAN | 
| ISO19770-1:2012 SAM Process Guidance: A kick-start to your SAM programme | Author/Editor: RORY CANAVAN | 
| ISO22301: 2019 - An introduction to a business continuity management system (BCMS) | Author/Editor: ALAN CALDER | 
| ISO22301: A Pocket Guide | Author/Editor: TONY DREWITT | 
| ISO27001:2013 Assessments Without Tears, Ed. 2 | Author/Editor: STEVE G WATKINS | 
| ISO 27001 controls – A guide to implementing and auditing | Author/Editor: BRIDGET KENYON | 
| ISO 27001 Controls – A guide to implementing and auditing, Second edition, Ed. 2 | Author/Editor: BRIDGET KENYON | 
| ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment, Ed. 3 | Author/Editor: BRIAN HONAN | 
| ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment, Ed. 3 | Author/Editor: BRIAN HONAN | 
| ISO27001 in a Windows Environment: The best practice implementation handbook for a Microsoft Windows environment, Ed. 3 | Author/Editor: BRIAN HONAN | 
| ISO27001/ISO27002:2013: A Pocket Guide | Author/Editor: ALAN CALDER | 
| ISO 27001/ISO 27002: A guide to information security management systems | Author/Editor: ALAN CALDER | 
| ISO27001 / ISO27002: A Pocket Guide, Ed. 2 | Author/Editor: ALAN CALDER | 
| ISO27001/ISO27002: Ein Taschenführer | Author/Editor: ALAN CALDER | 
| ISO27001/ISO27002: Guida tascabile | Author/Editor: ALAN CALDER | 
| ISO27001/ISO27002: Una guía de bolsillo | Author/Editor: ALAN CALDER | 
| ISO27001/ISO27002: Un guide de poche | Author/Editor: ALAN CALDER | 
| ISO 37001: An Introduction to Anti-Bribery Management Systems | Author/Editor: ALAN FIELD | 
| ISO 50001: A strategic guide to establishing an energy management system | Author/Editor: ALAN FIELD | 
| ISO 9001: A Pocket Guide | Author/Editor: Steve Watkins,Nick Orchiston | 
| ISO/IEC 20000: An Introduction to the global standard for service management, Ed. 2 | Author/Editor: DAVID CLIFFORD | 
| ISO/IEC 27001:2022: An introduction to information security and the ISMS standard | Author/Editor: STEVE G WATKINS | 
| ISO/IEC 27701:2019: An introduction to privacy information management | Author/Editor: ALAN SHIPMAN,STEVE WATKINS | 
| ISO/IEC 38500: A pocket guide, second edition | Author/Editor: ALAN CALDER | 
| ISO/IEC 38500: The IT Governance Standard | Author/Editor: ALAN CALDER | 
| IT Asset Management: A Pocket Survival Guide | Author/Editor: MARTYN HOBBS | 
| IT for Business (IT4B): From Genesis to Revolution, a business and IT approach to digital transformation | Author/Editor: BRIAN JOHNSON,WALTER ZONDERVAN | 
| IT Governance: A Pocket Guide | Author/Editor: ALAN CALDER | 
| IT Governance: Guidelines for Directors | Author/Editor: ALAN CALDER | 
| IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT | Author/Editor: ALAN CALDER,STEVE MOIR | 
| IT Governance Today: A Practitioners Handbook | Author/Editor: ALAN CALDER | 
| IT Governance to Drive High Performance: Lessons from Accenture | Author/Editor: ROBERT E. KRESS | 
| ITIL® 4 Create, Deliver and Support (CDS): Your companion to the ITIL 4 Managing Professional CDS certification | Author/Editor: CLAIRE AGUTTER | 
| ITIL 4 Digital and IT Strategy (DITS): Your companion to the ITIL 4 Strategic Leader DITS certification | Author/Editor: CLAIRE AGUTTER | 
| ITIL® 4 Direct, Plan and Improve (DPI): Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI certification | Author/Editor: CLAIRE AGUTTER | 
| ITIL® 4 Drive Stakeholder Value (DSV): Your companion to the ITIL 4 Managing Professional DSV certification | Author/Editor: CLAIRE AGUTTER | 
| ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond | Author/Editor: CLAIRE AGUTTER | 
| ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond, second edition, Ed. 2 | Author/Editor: CLAIRE AGUTTER | 
| ITIL® 4 High-velocity IT (HVIT): Your companion to the ITIL 4 Managing Professional HVIT certification | Author/Editor: CLAIRE AGUTTER | 
| ITIL and Organizational Change | Author/Editor: PAMELA ERSKINE | 
| ITIL Foundation Essentials ITIL 4 Edition - The ultimate revision guide, second edition, Ed. 2 | Author/Editor: CLAIRE AGUTTER | 
| ITIL® Foundation Essentials – ITIL 4 Edition: The ultimate revision guide, Ed. 2 | Author/Editor: CLAIRE AGUTTER | 
| ITIL Foundation Essentials: The exam facts you need | Author/Editor: CLAIRE AGUTTER | 
| ITIL Lifecycle Essentials: Your essential guide for the ITIL Foundation exam and beyond | Author/Editor: CLAIRE AGUTTER | 
| IT Induction and Information Security Awareness | Author/Editor: VALERIE MADDOCK | 
| IT Outsourcing Contracts: A Legal and Practical Guide | Author/Editor: JIMMY DESAI | 
| IT Project Management: 30 steps to success | Author/Editor: PREMANAND DORAISWAMY | 
| IT Regulatory Compliance in North America | Author/Editor: ALAN CALDER | 
| IT Regulatory Compliance in the UK | Author/Editor: ALAN CALDER | 
| It's All About Relationships: What ITIL® doesn't tell you | Author/Editor: S. D. Van Hove,Kathy S. Mills | 
| The ITSM Iron Triangle: Incidents, changes and problems | Author/Editor: DANIEL McLEAN | 
| IT Strategic and Operational Controls | Author/Editor: JOHN KYRIAZOGLOU | 
| Leading for Success: Unleash your leadership potential to achieve extraordinary results | Author/Editor: SARAH COOK | 
| Lessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure | Author/Editor: TOOMAS VIIRA | 
| Making a Success of Managing and Working Remotely | Author/Editor: SARAH COOK | 
| A Manager's Guide to ISO22301: A practical guide to developing and implementing a business continuity management system | Author/Editor: TONY DREWITT | 
| Managing AI Risk: A practical approach to responsibly managing AI with ISO 42001 | Author/Editor: ANDREW PATTISON | 
| Managing Business Transformation: A Practical Guide | Author/Editor: MELANIE FRANKLIN | 
| Managing in a Service-Focused World: I, team, stewards and marketplace | Author/Editor: ROGER K. WILLIAMS | 
| Managing Information Risk: A Director's Guide | Author/Editor: STEWART MITCHELL | 
| Managing Information Security Breaches: Studies from Real Life | Author/Editor: MICHAEL KRAUSZ | 
| Managing Information Security Breaches: Studies from real life, Ed. 2 | Author/Editor: MICHAEL KRAUSZ | 
| Managing IT in a Downturn: A Pocket Guide | Author/Editor: STEWART MITCHELL | 
| Mastering Effective Influencing Skills for Win-Win Outcomes: A practical guide | Author/Editor: SARAH COOK | 
| Measuring your IT: Identifying the metrics that matter | Author/Editor: JOHN STEWART | 
| Mobile Security: A Pocket Guide | Author/Editor: STEVEN FURNELL | 
| Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers | Author/Editor: ALAN CALDER | 
| Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services | Author/Editor: ALAN CALDER | 
| Neuf étapes vers le succès: Un aperçu de la mise en œuvre de la norme ISO 27001:2013 | Author/Editor: ALAN CALDER | 
| Neun Schritte zum Erfolg: Ein Überblick zur Implementierung der Norm ISO 27001:2013 | Author/Editor: ALAN CALDER | 
| Nine Steps to Success: An ISO27001:2013 Implementation Overview, Ed. 3 | Author/Editor: ALAN CALDER | 
| Nine Steps to Success: An ISO27001:2013 Implementation Overview, Ed. 3 | Author/Editor: ALAN CALDER | 
| Nine Steps to Success: An ISO 27001:2022 Implementation Overview | Author/Editor: ALAN CALDER | 
| Nine Steps to Success: An ISO 27001 Implementation Overview, North American edition | Author/Editor: ALAN CALDER | 
| Nine Steps to Success: North American edition: An ISO 27001 Implementation Overview | Author/Editor: ALAN CALDER | 
| NIST CSF 2.0: Your essential introduction to managing cybersecurity risks | Author/Editor: ANDREW PATTISON | 
| NIST Cybersecurity Framework: A pocket guide | Author/Editor: Alan Calder | 
| No One of Us is as Strong as All of Us: Services, catalogs and portfolios | Author/Editor: DANIEL McLEAN | 
| Nueve pasos para el éxito: Una visión de conjunto para la aplicación de la ISO 27001:2013 | Author/Editor: ALAN CALDER | 
| OHSAS 18001 Step by Step: A Practical Guide | Author/Editor: NAEEM SADIQ | 
| Oh sh!t, I've got bowel cancer: Part One: Diagnosis and treatment diaries | Author/Editor: DAVID BARROW | 
| Once more unto the Breach: Managing information security in an uncertain world, Ed. 2 | Author/Editor: ANDREA C SIMMONS | 
| Once more unto the Breach: Managing information security in an uncertain world | Author/Editor: ANDREA C SIMMONS | 
| Outsourcing IT: A governance guide | Author/Editor: RUPERT KENDRICK | 
| PCI DSS: A Pocket Guide - 3rd edition | Author/Editor: ALAN CALDER,GERAINT WILLIAMS | 
| PCI DSS: A Pocket Guide, Ed. 2 | Author/Editor: ALAN CALDER,NICKI CARTER | 
| PCI DSS: A Pocket Guide, Ed. 5 | Author/Editor: ALAN CALDER ,GERAINT WILLIAMS | 
| PCI DSS: A Pocket Guide, fifth edition, Ed. 5 | Author/Editor: ALAN CALDER,GERAINT WILLIAMS | 
| PCI DSS: A Pocket Guide, fourth edition, Ed. 4 | Author/Editor: ALAN CALDER,GERAINT WILLIAMS | 
| PCI DSS: A pocket guide, sixth edition, Ed. 6 | Author/Editor: ALAN CALDER,GERAINT WILLIAMS | 
| PCI DSS: A Practical Guide to Implementing and Maintaining Compliance, Ed. 3 | Author/Editor: STEVE WRIGHT | 
| PCI DSS Version 4.0.1: A Guide to the Payment Card Industry Data Security Standard | Author/Editor: STEPHEN HANCOCK | 
| PCI DSS Version 4.0: A guide to the payment card industry data security standard | Author/Editor: STEPHEN HANCOCK | 
| Penetration Testing: Protecting Networks and Systems | Author/Editor: KEVIN M. HENRY | 
| Penetration Testing Services Procurement Guide | Author/Editor: CREST | 
| The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team | Author/Editor: JAMIE LYNN COOKE | 
| The Power of the Agile Business Analyst, second edition: 30 surprising ways a business analyst can add value to your Agile development team, Ed. 2 | Author/Editor: JAMIE LYNN COOKE | 
| Practical IT Service Management: A Concise Guide for Busy Executives | Author/Editor: Thejendra BS | 
| Practical IT Service Management: A concise guide for busy executives | Author/Editor: THEJENDRA B.S | 
| Pragmatic Application of Service Management: The Five Anchor Approach, Ed. 2 | Author/Editor: S. D. VAN HOVE,MARK THOMAS | 
| Pragmatic Application of Service Management: The Five Anchor Approach | Author/Editor: S. D. VAN HOVE,MARK THOMAS | 
| Presentation Skills for Technical Professionals: Achieving Excellence | Author/Editor: NAOMI KARTEN | 
| PRINCE2 Agile An Implementation Pocket Guide: Step-by-step advice for every project type | Author/Editor: JAMIE LYNN COOKE | 
| The PRINCE2 Agile® Practical Implementation Guide – Step-by-step advice for every project type, Second edition | Author/Editor: JAMIE LYNN COOKE | 
| PRINCE2 in Action: Project management in real terms | Author/Editor: SUSAN TUTTLE | 
| Procuring Penetration Testing Services | Author/Editor: CREST | 
| Project Governance: The Essentials | Author/Editor: ROD BEECHAM | 
| The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour | Author/Editor: LERON ZINATULLIN | 
| The Quantum Age of IT: Why everything you know about IT is about to change | Author/Editor: CHARLES ARAUJO | 
| The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks | Author/Editor: ALAN CALDER | 
| Reglamento General de Protección de Datos (RGPD) de la UE: Una guía de bolsillo | Author/Editor: ALAN CALDER | 
| Release and Deployment: An ITSM narrative | Author/Editor: DANIEL McLEAN | 
| Resilient Thinking: Protecting Organisations in the 21st Century | Author/Editor: PHILLIP WOOD | 
| Resilient Thinking: Protecting organisations in the 21st century, Second edition | Author/Editor: PHILLIP WOOD | 
| Reviewing IT in Due Diligence: Are you buying an IT asset or liability | Author/Editor: CHRISTOPHER WRIGHT,BRYAN ALTIMAS | 
| RGPD UE: Guide de poche | Author/Editor: ALAN CALDER | 
| Right First Time: Buying and integrating advanced technology for project success | Author/Editor: PETER SAMMONS | 
| Risk Assessment for Asset Owners | Author/Editor: ALAN CALDER,STEVE G WATKINS | 
| Risk Management and ISO 31000: A pocket guide | Author/Editor: ALAN FIELD | 
| Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT, Ed. 2 | Author/Editor: ROBERT E. KRESS | 
| Securing Cloud Services: A pragmatic approach, second edition, Ed. 2 | Author/Editor: LEE NEWCOMBE | 
| Securing Cloud Services: A pragmatic approach to security architecture in the Cloud | Author/Editor: LEE NEWCOMBE | 
| Securing Cloud Services - A pragmatic guide: Second edition, Ed. 2 | Author/Editor: LEE NEWCOMBE | 
| The Security Consultant's Handbook | Author/Editor: RICHARD BINGLEY | 
| Security in the Digital World | Author/Editor: GRAHAM DAY | 
| Security Testing Handbook for Banking Applications | Author/Editor: ARVIND DORAISWAMY,SANGITA PAKALA,NILESH KAPOOR,PRASHANT VERMA,PRAVEEN SINGH,RAGHU NAIR,SHALINI GUPTA | 
| Security: The Human Factor | Author/Editor: PAUL KEARNEY | 
| Selection Management: For Systems and Services | Author/Editor: JACQUIE WAKEFORD | 
| Selling Information Security to the Board: A Primer | Author/Editor: ALAN CALDER | 
| Selling Information Security to the Board: A Primer, Ed. 2 | Author/Editor: ALAN CALDER | 
| The Service Desk Handbook ??? A guide to service desk implementation, management and support | Author/Editor: SANJAY NAIR | 
| Service Integration and Management (SIAM™) Foundation Body of Knowledge (BoK), Second edition | Author/Editor: CLAIRE AGUTTER | 
| Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition | Author/Editor: MICHELLE MAJOR-GOLDSMITH ,SIMON DORST ,CLAIRE AGUTTER | 
| Service Level Agreements: A legal and practical guide | Author/Editor: JIMMY DESAI | 
| SIAM/MSI: An Introduction to Service Integration and Management/ Multi-Sourcing Integration for IT Service Management | Author/Editor: DAVID CLIFFORD | 
| Software Life Cycle Management Standards: Real-world Scenarios and Solutions for Savings | Author/Editor: DAVID WRIGHT | 
| SWANSON on Internal Auditing: Raising the Bar | Author/Editor: DAN SWANSON | 
| The Tao of Open Source Intelligence | Author/Editor: STEWART K. BERTRAM | 
| Ten Steps to ITSM Success: A Practitioner’s Guide to Enterprise IT Transformation | Author/Editor: ANGELO ESPOSITO,TIMOTHY ROGERS | 
| The True Cost of Information Security Breaches and Cyber Crime | Author/Editor: MICHAEL KRAUSZ,JOHN WALKER | 
| Turning Heads and Changing Minds: Transcending IT Auditor Archetypes | Author/Editor: CHONG EE | 
| Two-Factor Authentication | Author/Editor: MARK STANISLAV | 
| UE-RGDP: Guida tascabile | Author/Editor: ALAN CALDER | 
| The Universal Service Desk (USD): Implementing, controlling and improving service delivery | Author/Editor: BRIAN JOHNSON,LÉON-PAUL DE ROUW | 
| Validating Your Business Continuity Plan | Author/Editor: ROBERT A. CLARK | 
| Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely | Author/Editor: Lori Mac Vittie | 
| Well-being in the workplace: A guide to resilience for individuals and teams | Author/Editor: SARAH COOK |