https://www.itgovernance.co.uk

Content Type OA ? PCA ?
Books (Back List, Front List) No Yes

Request a holdings comparison

Portico provides a free holdings comparison service to compare a library’s journal or book holdings to the Portico archive.

Show:
 
Titles start with C (30) Information
The California Consumer Privacy Act (CCPA): An implementation guide
Author/Editor: PRESTON BUKATY
The California Privacy Rights Act (CPRA) – An implementation and compliance guide
Author/Editor: PRESTON BUKATY
The Case for ISO27001:2013, Ed. 2
Author/Editor: ALAN CALDER
Catalogs, Services and Portfolios: An ITSM success story
Author/Editor: DANIEL McLEAN
Changing how you manage and communicate change: Focusing on the human side of change
Author/Editor: NAOMI KARTEN
Changing the IT Leader's Mindset: Time for revolution rather than evolution
Author/Editor: ROBINA CHATHAM,BRIAN SUTTON
The Chief Information Security Officer: Insights, tools and survival skills
Author/Editor: BARRY L. KOUNS,JAKE KOUNS
The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape
Author/Editor: BARRY KOUNS ,JAKE KOUNS
Cloud Computing: Assessing the risks
Author/Editor: JARED CARSTENSEN,BERNARD GOLDEN,JP MORGENTHAL
Cloud Security and Governance: Who's on your cloud?
Author/Editor: SUMNER BLOUNT,ROB ZANELLA
Coaching for High Performance: How to develop exceptional results through coaching
Author/Editor: SARAH COOK
Collaborative Business Design: Improving and innovating the design of IT-driven business services
Author/Editor: BRIAN JOHNSON,LÉON-PAUL DE ROUW
Collaborative Business Design: The Fundamentals
Author/Editor: Brian Johnson,Léon-Paul de Rouw
Compliance by Design: IT controls that work
Author/Editor: CHONG EE
Compliance for Green IT: A Pocket Guide
Author/Editor: ALAN CALDER
Computer Forensics: A Pocket Guide
Author/Editor: NATHAN CLARKE
A concise introduction to the NIS Directive: A pocket guide for digital service providers
Author/Editor: ALAN CALDER
The Concise PRINCE2®: A Pocket Guide, Ed. 2
Author/Editor: COLIN BENTLEY
The Concise PRINCE2® - Principles and essential themes: Third edition, Ed. 3
Author/Editor: COLIN BENTLEY
Controles estratégicos y operacionales de la TI
Author/Editor: JOHN KYRIAZOGLOU
Coping with Unplanned Absences: A Pocket Guide
Author/Editor: SARAH COOK
Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications
Author/Editor: ALAN CALDER
Cyber Essentials: A Pocket Guide
Author/Editor: ALAN CALDER
Cyber resilience: Defence-in-depth principles
Author/Editor: ALAN CALDER
Cyber Risks for Business Professionals: A Management Guide
Author/Editor: RUPERT KENDRICK
Cyber Security: Essential principles to secure your organisation
Author/Editor: ALAN CALDER
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF)
Author/Editor: ALAN CALDER
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide
Author/Editor: WILLIAM GAMBLE
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger
Author/Editor: JULIE E. MEHAN
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment
Author/Editor: JULIE E. MEHAN