Bookstore-2014-Catalog Bro Eng 0314

44
YOUR LEADING 2014 BOOKSTORE CATALOG isaca.org/bookstore RESOURCE FOR SUCCESS

description

Catalog

Transcript of Bookstore-2014-Catalog Bro Eng 0314

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    12014 BOOKSTORE CATALOG

    YOUR LEADING

    2014 BOOKSTORE CATALOGisaca.org/bookstore

    RESOURCE FOR SUCCESS

  • 2 32014 BOOKSTORE CATALOG

    THOUGHT LEADERSHIPEquip yourself with knowledge critical to thinking strategically and navigating todays complex IT issues. From surveys and whitepapers to frameworks, standards and research publications, ISACA has what you need.

    ISACA JOURNALGet access to cutting-edge, front-line perspectives on emerging trends, developing risks and professional development.

    ISACA BOOKSTOREExplore a peer-reviewed collection of industry publications, including COBIT 5 products and exam resources for insights and guidance that youll never want to be without.

    ISACAS eLIBRARYBrowse over 575 titles on demand to supplement your knowledge and sharpen your skills.

    KNOWLEDGE CENTERDont face your technology challenges alone. Connect and collaborate with like-minded professionals on topics of mutual interest and share your real-world experiences.

    ADVOCACYShare your expertise and experience to enhance the awareness and influence of our association. Our advocacy efforts help build and promote the importance, integrity and value of ISACA credentials and knowledge on a global scale

    WHATS INSIDE... RESEARCH & RESOURCESTABLE OF CONTENTS

    4 COBIT PRODUCTS

    COBIT 5 & Related Products

    COBIT 4.1 & Related Products

    14 EXAMINATION REFERENCE MATERIALS

    CISA

    CISM

    CGEIT

    CRISC

    20 NON-ENGLISH RESOURCES

    36 RISK-RELATED

    41 AUDIT, CONTROL and SECURITY RELATED

    Essentials

    Specific Environments

    54 INTERNET & RELATED SECURITY TOPICS

    65 IT GOVERNANCE & BUSINESS MANAGEMENT

    80 INVENTORY REDUCTION SALE

    83 TITLE INDEX

    KNOWLEDGE, COMMUNITY AND GUIDANCE HELP DELIVER ENTERPRISE VALUE WORLDWIDE

    By working collectively with our global community of thought leaders, innovators and professionals, ISACA develops globally accepted research, standards, frameworks and guidance that enhance the profession and support enterprise success worldwide. This ability to leverage member expertise makes ISACA the most trusted resource for thought leadership and advocacy in IT audit, compliance, security, risk, privacy and governance for industries, enterprises and individuals.

    Our goal is to make members more valued, knowledgeable and capable of illuminating opportunities, exposing risks and revealing the road ahead for organizations all over the globe.

  • 4 52014 BOOKSTORE CATALOG

    The collective wisdom and practical expertise of global experts helped shape the COBIT 5 framework, which represents the most significant evolution in COBITs 16-year history. It went through a public exposure period and also was reviewed by more than 95 governance, security, risk and assurance professionals worldwide.

    Business and IT leaders need up-to-date tools and expertise to navigate an increasingly complex business and IT environment. COBIT 5 can help. It represents the next generation of ISACAs guidance, unifying previous frameworks and standards.

    COBIT 5

    COBIT 5 Enabler Guides

    COBIT 5 Professional Guides

    COBIT 5 Implementation

    COBIT 5: Enabling Processes

    COBIT 5 For Information Security

    COBIT 5: Enabling Information

    COBIT 5 For Assurance

    COBIT 5 For Risk

    COBIT 5 Online Collaborative Environment

    COBIT 5 & RELATED PRODUCTS

    COBIT 4.1 & RELATED PRODUCTS

    Section: 01COBIT PRODUCTS

    Robust Family of Products

    The COBIT 5 product family includes the centerpiece framework and encompasses a comprehensive set of enabler and professional guides and resources that provide additional guidance on how professionals in all industries and geographies can use COBIT to deliver their products and services. Bring order to the growing complexity of IT.

    Globally Endorsed & Validated

    COBIT 5: A Flexible Framework

    VAL IT AND RELATED PRODUCTS

    RISK IT AND RELATED PRODUCTS

    COBIT 5 signifies a transformation in the business view of the governance and management of enter-prise IT. It accelerates the alignment of organizational strategy and IT in a way that increases value, stimu-lates growth and creates distinct competitive advantages, all while fortifying against threats and risks.

    A consolidated, comprehensive resource, COBIT 5 embodies global thought leadership and guidance, and is an asset that helps business, IT and governance experts around the world thrive.

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    6 72014 BOOKSTORE CATALOG

    COBIT 5 COBIT 5

    PROFESSIONAL GUIDES

    COBIT 5 Implementation Information and related information technologies are pervasive in enterprises. It is no longer possible or good practice to separate business and IT-related activities. The governance and management of enterprise IT should be an integral part of enterprise governance, covering the each enterprise, end-to-end.

    Member: US $35.00Nonmember: US $150.00Currently available in 4 languagesAvailable in print CB5IG and eBook WCB5IG

    COBIT 5 for Information SecurityCOBIT 5 for Information Security examines COBIT 5 from a security view, placing a security lens over the concepts, enablers and principles. Using it can help enterprises benefit from improved risk decisions and cost management related to information security.

    Member: US $35.00Nonmember: US $175.00Available in print CB5IS and eBook WCB5IS

    COBIT 5 for Assurance Building on the COBIT 5 framework, this guide focuses on assurance and provides more detailed and practical guidance for assurance professionals and other interested parties at all levels of the enterprise on how to use COBIT 5 to support a variety of IT assurance activities.

    Member: US $35.00Nonmember: US $175.00Available in print CB5A and eBook WCB5A

    COBIT PRODUCTS

    COBIT 5: A Business Framework for the Governance and Management of Enterprise IT This volume documents the five principles and seven supporting enablers that defines the COBIT 5 framework and incorporates the latest thinking in enterprise governance and management techniques.

    Member: US $35.00Nonmember: US $50.00Currently available in 8 languagesA complimentary eBookAvailable in print CB5 and eBook WCB5

    ENABLER GUIDES

    COBIT 5: Enabling ProcessesThis publication contains a detailed reference guide to the processes defined in the COBIT 5 process reference model. COBIT 5: Enabling Processes includes the COBIT 5 Goals Cascade, a process mode explanation and the process reference model.

    Member: US $35.00Nonmenber: US $135.00Currently available in 7 languagesAvailable in print CB5EP and eBook WCB5EP

    COBIT 5: Enabling InformationA reference guide that provides a structured way of thinking about information governance and management issues in any type of organization. This structure can be applied throughout the life cycle of information, from conception through the time information is destroyed.

    Member: US $35.00 Nonmember: US $135.00Available in print CB5EI and eBook WCB5EI

    PROFESSIONAL GUIDES (Continued)

    COBIT 5 for RiskEffectively managing IT risk helps drive better business performance by linking information and technology risk to the achievement of strategic enterprise objectives. This information risk view of COBIT 5 provides detailed guidance to help businesses leaders manage risk in their organization.

    Member: US $35.00Nonmember: US $175.00Available in print CB5RK and eBook WCB5RK

    COBIT ASSESSMENT PROGRAM

    COBIT Process Assessment Model (PAM): Using COBIT 5 The Process Assessment Model (PAM) for COBIT 5 provides a repeatable and reliable way to assess IT process capabilities, which helps IT leaders gain C-level and board member buy-in for change and improvement initiatives.

    Member: US $30.00Nonmember: US $50.00Available in print CPAM5 and eBook WCPAM5

    COBIT Assessor Guide: Using COBIT 5Provide organizations with an understandable, logical, repeatable, reliable and robust methodology for assessing the capability of their IT processes. Assessments can then be used to report on the capability of the organizations IT processes or to establish a target for improvement based on business requirements.

    Member: US $30.00Nonmember: US $80.00Available in print CAG5 and eBook WCAG5

    COBIT Self-Assessment Guide: Using COBIT 5 Building on the COBIT 5 framework, this guide focuses on assurance and provides more detailed and practical guidance for assurance professionals and other interested parties at all levels of the enterprise on how to use COBIT 5 to support a variety of IT assurance activities.

    Member: US $30.00Nonmember: US $50.00Available in print CSAG5 and eBook WCSAG5

    COBIT 5 Special BulkDiscount Structure

    5-9 copies .....................................................10%

    10-19 copies .....................................................15%

    20-39 copies .....................................................20%

    40-69 copies .....................................................30%

    70-99 copies .....................................................40%

    100+ copies .....................................................50%

    COBIT 5 Bundle Discount:Purchase the complete COBIT 5 Bundle and save!

    The set includes:

    COBIT 5 COBIT 5 Implementation COBIT 5: Enabling Processes

    MEMBER PRICE: US $95.00NON-MEMBER PRICE: US $275.00

    *COBIT 5 Special Bulk Discount does not apply to the COBIT 5 Bundle.

    A Business Framework for the Governance and Management of Enterprise IT

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    8 92014 BOOKSTORE CATALOG

    COBIT 5 COBIT 5

    BUSINESS GOVERNANCE AND MANAGEMENT OF ENTERPRISE IT

    Download a complimentary copy of COBIT 5 today or learn more at www.isaca.org/cobit

    112

    2 3

    9.6 MILLION

    US $1 TRILLION

    AVERAGE COST

    $5,000A MINUTE

    EMAILS PER DAY

    CYBERCRIME COSTS

    PER YEAR

    PETABYTES:business-related information

    processed by the worlds computer servers per year

    http://www.isaca.org/About-ISACA/Press-room/News-Releases/2011/Pages/ISACA-Survey-Bring-Your-Own-Device-Trend-Heightens-Online-Holiday-Shopping-Risk.aspxhttp://www.gsma.com/articles/gsma-announces-the-business-impact-of-connected-devices-could-be-worth-us-4-5-trillion-in-2020/22536

    http://blogs.mcafee.com/mcafee-labs/mcafee-q4-threats-report-shows-malware-surpassed-75-million-samples-in-2011http://www.radicati.com/?p=6904

    http://ucsdnews.ucsd.edu/newsrel/general/04-05BusinessInformation.asphttp://www.informationweek.com/thebrainyard/news/community_management_development/231602379http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html

    http://www.mofo.com/privacy--data-security-services/http://www.time.com/time/world/article/0,8599,2108354,00.html

    http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007/

    THE AVERAGE CORPORATE WORKER SENDS & RECEIVES

    1

    3WORKERRECEIVES

    TERABYTESof

    INFORMATIONPER YEAR

    6 OUT OF 10EMPLOYEESAGES 18-35USE A PERSONALDEVICE FOR WORK

    CONNECTEDDEVICES

    by

    COMPANIES

    RISK

    2011

    2020

    MALWARESAMPLES

    in

    2012

    SOCIALMEDIAINCIDENTS

    SOURCES

    from

    are at

    65PASS****

    FOR DOWNTIME

    $380B

    24B

    75M

    COST OF DISASTERSin

    EXTRACTING VALUE FROM

    INFORMATION CHAOS

    SECURITY BREACHES

    DATA PROLIFERATION

    DOWNTIME

    BYOD [BRING YOUR OWN DEVICE]

    SOCIAL MEDIA RISK

    COUNTRIES HAVE THEIR OWN DATA

    PROTECTIONLAWS

    PRIVACY REGULATIONS

    WHY GOOD GOVERNANCE MAKES GOOD SENSE

    Securing Mobile Devices: Using COBIT 5 for Information SecurityThis publication is intended for several audiences who use mobile devises directly or indirectly. The publication applies COBIT 5 to mobile device security is to establish a uniform management framework and to give guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises.

    Member: US $35.00Nonmember: US $75.00Available in print CB5SMD and eBook WCB5SMD

    Transforming Cybersecurity: Using COBIT 5Cybersecurity has evolved as a new field of interest, gaining political and societal attention. Given this magnitude, the future tasks and responsibilities associated with cybersecurity will be essential to organizational survival and profitability. This publication applies the COBIT 5 framework and its component publications to transforming cybersecurity in a systemic way.

    Member: US $35.00 Nonmember: US $60.00Available in print CB5TC and eBook WCB5TC

    COBIT PRACTICAL GUIDANCE

    Configuration Management: Using COBIT 5Enterprises continuously experience changes and without proper communication and coordination, signs of malfunction are likely to manifest as business disruptions, inefficiencies and potential financial losses. This publication provides detailed guidance to help enterprise leaders manage change and minimize unforeseen impacts.

    Member: US $30.00Nonmember: US $55.00Available in print CB5CM and eBook WCB5CM

    COBIT 5 Training Programs

    ISACA offers a wide variety of COBIT training programs designed to fit your unique requirements for subject matter and learning style.

    COBIT 5 Foundation Course & Exam COBIT 5 Implementation Course & Exam COBIT Certified Assessor Program COBIT Certified Assessor Course COBIT Certified Assessor Exam COBIT Certified Assessor Certification

    Learn more at www.isaca.org/COBIT5

    Vendor Management: Using COBIT 5This publication describes the vendor management process and its activities and then presents the most common threats, risk and mitigation actions. A detailed case study is provided to show the potential consequences of faulty vendor management. Practical sample templates and checklists are also.

    Member: US $35.00Nonmember: US $60.00Available in print CB5VM and eBook WCB5VM

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    10 112014 BOOKSTORE CATALOG

    COBIT 4.1 and Related ProductsCOBIT 5

    COBIT 5

    COBIT 5 builds and expands on COBIT 4.1 by integrating other major frameworks, standards and resources, including ISACAs Val IT and Risk IT, Information Technology Infrastructure Library (ITIL) and related standards from the International Organization for Standardization (ISO) and also draws significantly from the Business Model for Information Security (BMIS) and ITAF.

    You are invited to download the COBIT 5 framework for no charge and if more guidance is needed, reference the individual publications for more detail.

    Download here: www.isaca.org/COBIT

    COBIT Focus

    The COBIT Focus newsletter is complimentary to all COBIT users. Sign Up >

    COBIT 5 Benefits Enterprises of all sizes:

    Maintain high-quality information to support business decisions

    Achieve strategic goals through the effective and innovative use of IT

    Achieve operational excellence through reliable, efficient application of technology

    Maintain IT-related risk at an acceptable level

    Optimize the cost of IT services and technology

    Support compliance with relevant laws, regulations, contractual agreements and policies

    COBIT 5 consolidates and integrates the COBIT 4.1, Val IT 2.0 and Risk IT frameworks and also draws significantly from BMIS and ITAF. You are invited to review the COBIT 5 framework first at isaca.org/COBIT and if more guidance is needed, reference the individual publications for more detail.

    Business BenefitsBeyond IT

    In todays value-driven world, decisions cant be made in vacuums or silos. The comprehensive nature of business is reflected in the comprehensive nature of COBIT 5. Its globally accepted principles, practices, analytical tools and models are designed for business executives as well as , and enterprises of all sizes and in all industries can benefit. COBIT 5 addresses the needs of business and IT stakeholders across the enterprise and helps clarify goals for more effective decision making. COBIT 5 helps demonstrate that the right priorities are in place, the right decisions are being made and risk is being addressed. It allows enterprises to rely on established, credible practices, rather than reinvent the wheel. It was developed by strong international thought leaders, and will continue to evolve with advancements in the industry.

    COBIT 4.1 ISACAMember US $75.00Nonmember US $190.00CB4.1

    COBIT and Application Controls: A Management Guide ISACAPrint CACMember US $35.00Nonmember US $75.00eBook WCAC Nonmember US $55.00

    COBIT Control Practices: Guidance to Achieve Control Objectives for Successful IT Governance, 2nd Edition ISACAMember US $55.00Nonmember US $110.00CPS2

    COBIT Process Assessment Model (PAM): Using COBIT 4.1 ISACA Print CPAMMember US $30.00Nonmember US $50.00eBook WCPAM Nonmember US $40.00

    COBIT Self-assessment Guide: Using COBIT 4.1 ISACA Print CSAGMember $25.00Nonmember $40.00eBook WCSAG Nonmember US $30.00

    COBIT Quickstart, 2nd Edition ISACA Member US $55.00Nonmember US $110.00CBQ2

    COBIT Assessor Guide: Using COBIT 4.1 ISACA Print CAGMember US $50.00Nonmember US $100.00eBook WCAG Member US $30.00Nonmember US $80.00

    COBIT Security Baseline: An Information Security Survival Kit, 2nd EditionISACA Member US $20.00Nonmember US $40.00CBSB2

    COBIT User Guide for Service ManagersISACA Print CUGMember US $20.00Nonmember US $50.00eBook WCUG Nonmember US $35.00

    IT Assurance Guide: Using COBITISACA Member US $55.00Nonmember US $165.00CB4A

    Implementing and Continually Improving IT GovernanceISACA Member US $55.00Nonmember US $115.00ITG9

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    12 132014 BOOKSTORE CATALOG

    COBIT 4.1 and Related Products COBIT 4.1 and Related Products

    IT is complicated.IT governance does not have to be.

    For more information on COBIT 5 and its family of products, visit the ISACAwebsite at www.isaca.org/cobit.

    Meycor ProductsCOBIT Suite Datasec

    The Meycor COBIT Suite is a complete and integrated software for use in implementing COBIT 4.1 as a governance of IT, IT security or IT assurance tool. It includes five modules:

    Meycor COBIT CSA (Control Self Assessment)

    Meycor COBIT MG (Management & Governance)

    Meycor COBIT AG (Assurance Guidelines)

    Meycor COBIT KP (Knowledge Provider)

    Meycor COBIT Delphos (Balanced Scorecard)

    It also includes a central module that allows for the performance of administrative and functional tasks among different modules. All COBIT contents are unified in a single database shared by different modules.

    Enterprise Value: Governance of IT Investments, Getting Started With Value Managemente-book VITM Member US $25.00Nonmember US $40.00

    Enterprise Value: Governance of IT Investments,The Val IT Framework 2.0e-book VITF2 Member US $45.00Nonmember US $90.00

    The Business Case Guide Using Val IT 2.0e-book VITB2 Member US $25.00Nonmember US $40.00

    The Business Value of IT: Managing Risks, Optimizing Performance and Measuring ResultsMichael D. S. Harris, David Herron and Stasia Iwanicki

    39CR Member US $80.00Nonmember US $90.00

    The Risk IT FrameworkRITFMember US $45.00Nonmember US $95.00

    The Risk IT Practitioner GuideRITPGMember US $46.00Nonmember US $115.00

    VAL IT AND RELATED PRODUCTS

    RISK IT AND RELATED PRODUCTSVAL IT AND RELATED PRODUCTS (Continued)

    SharePoint Deployment Governance Using COBIT 4.1: A Practical ApproachISACA Member US $30.00Nonmember US $70.00SDG

    COBIT Suite DatasecISACA

    Web Site Download EMSWMember US $9,849.00Nonmember US $10,970.00

    COBIT CSA (Control Self-assessment) ISACA

    Web Site Download ECSAWMember US $2,010.00Nonmember US $2,260.00

    COBIT MG (Management Guidelines) ISACA

    Web Site Download EMGW Member US $2,258.00Nonmember US $2,540.00

    COBIT AG (Audit Guidelines) ISACA

    Web Site Download EAGW Member US $2,258.00Nonmember US $2,540.00

    COBIT KP (Knowledge Provider) ISACA

    Web Site Download EKPW Member US $3,694.00Nonmember US $4,120.00

    COBIT Delphos ISACA

    Web Site Download EDWMember US $2,550.00 Nonmember US $2,860.00 Risk Management Approach to Business Continuity: Aligning Business

    Continuity With Corporate GovernanceDavid Kaye and Julia Graham

    5ROMember US $95.00Nonmember US $105.00

    Enterprise Value: Governance of IT Investments Complete Set VITS2Member US $105.00Nonmember US $185.00

    Value Management Guidance for Assurance Professionals: Using Val IT 2.0VITAGMember US $25.00Nonmember US $40.00eBook

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    14 152014 BOOKSTORE CATALOG

    Exam References

    CISA

    CISM

    CGEIT

    CRISC

    Section: 02EXAM REFERENCE

    ISACA certifications are recognized globally as the industry standard and in many cases as job prerequisites for IT audit, assurance, control, governance, risk and security-related positions.

    Enterprises worldwide are seeking forward-thinking thought leaders with the skill to anticipate problems and stay ahead of the curve. Having an ISACA certification announces you and your team are accomplished individuals with an innovative point of view and up to the task to help set the enterprise up for future success.

    CISA PRODUCTS

    CISA Review Manual 2014 A comprehensive reference guide designed to help individuals prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed IS audit, assurance, security and control resource available worldwide.

    Member price: US $105.00 Nonmember price: US $135.00CRM14

    Available in: Chinese Simplified, Japanese, Spanish, Italian, French

    CISA Review Questions, Answers & Explanations Manual 2014 SupplementThis guide features 100 new sample questions, answers and explanations to help candidates effectively prepare for the CISA exam. The questions are intended to provide CISA candidates with an understanding of the type and structure of questions that have typically appeared on past exams.

    Member price: US $40.00Nonmember price: US $60.00QAE14ES

    Available in: Chinese Simplified, Japanese, Spanish, Italian, French

    CISA Review Questions, Answers & Explanations Manual, 2013 Supplement This guide features 100 new sample questions, answers and explanations to help candidates effectively prepare for the CISA exam. The questions are intended to provide CISA candidates with an understanding of the type and structure of questions that have typically appeared on past exams.

    Member price: US $40.00 Nonmember price: US $60.00 QAE13ESAvailable in: Chinese Simplified, Japanese, Spanish, Italian, French

    CISA Practice Question Database v14A comprehensive 1,150-question study guide that combines the 950 questions and answers from the CISA Review Questions, Answers & Explanations Manual 2013 with those from the 2013 and 2014 editions of the CISA Review Questions, Answers & Explanations Manual Supplements(100 questions and answers each). Exam candidates can take sample exams with randomly selected questions, and view the results by job practice domain, allowing for concentrated study in particular areas. Additionally, questions generated during a study session are sorted based on previous scoring history, allowing CISA candidates to identify their strengths and weaknesses and focus their study efforts accordingly.

    Member price: US $185.00 Nonmember price: US $225.00Available in CD-ROM CDB14 or Download CDB14W

    Available in Spanish

    CISA Review Questions, Answers & Explanations Manual 2013Designed to familiarize candidates with the question types and topics featured in the CISA exam, this guide consists of 950 multiple-choice study questions that have previously appeared in the CISA Review Questions, Answers & Explanations Manual 2011 and the 2011 and 2012 Supplements.

    Member price: US $100.00 Nonmember price: US $130.00QAE14

    Available in: Chinese Simplified, Japanese, Spanish, Italian

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    16 172014 BOOKSTORE CATALOG

    Exam References Exam References

    CISM PRODUCTS

    CISM Review Manual 2014A comprehensive reference guide designed to help individuals prepare for the CISM exam and understand the roles and responsibilities of an information security manager. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed information security management resource available worldwide.

    Member price: US $85.00 Nonmember price: US $115.00CM14

    Available in Spanish

    CISM Review Questions, Answers & Explanations Manual 2014 SupplementThis guide features 100 new sample questions, answers and explanations to help candidates effectively prepare for the CISM exam. The questions are intended to provide CISM candidates with an understanding of the type and structure of questions that have typically appeared on past exams.

    Member price: US $40.00 Nonmember price: US $60.0014ES

    Available in Spanish

    CISM PRODUCTS (Continued)

    CISM Review Questions, Answers & Explanations Manual 2014 The guide consists of 815 multiple-choice study questions, answers and explanations, which are organized according to the CISM job practice domains. The questions in this manual have been consolidated from the CISM Review Questions, Answers & Explanations Manual 2012 and the 2012 and 2013 editions of the CISM Review Questions, Answers & Explanations Manual Supplement.

    Member price: US $70.00 Nonmember price: US $90.00CQA14

    Available in Japanese, Spanish

    CISM Practice Question Database v14A comprehensive 915-question study guide that combines the questions from the Review Questions, Answers & Explanations Manual 2014 with those from the 2014 supplement. Exam candidates can take sample exams with randomly selected questions, and view the results by job practice domain, allowing for concentrated study in particular areas. Additionally, questions generated during a study session are sorted based on previous scoring history, allowing CISM candidates to identify their strengths and weaknesses and focus their study efforts accordingly.

    Member price: US $120.00 Nonmember price: US $160.00

    Available in CD-ROM MDB14 or Download MDB14W

    CGEIT PRODUCTS

    CGEIT Review Manual 2014 The CGEIT Review manual is designed to help individuals prepare for the CGEIT exam and understand the responsibilities of those who implement or manage the governance of enterprise IT (GEIT) or have significant advisory or assurance responsibilities in regards to GEIT.

    Member price: US $85.00 Nonmember price: US $115.00CGM14

    CGEIT Review Questions, Answers & Explanations Manual 2013The CGEIT Review Questions, Answers & Explanations Manual 2013 is designed to familiarize candidates with the question types and topics featured in the CGEIT exam. The 60 questions in this manual have been consolidated from the CGEIT Review Questions, Answers & Explanations Manual 2011 and the CGEIT Review Questions, Answers & Explanations Manual 2012 Supplement.

    Member price: US $40.00 Nonmember price: US $60.00CGQ13

    CGEIT Review Questions, Answers & Explanations Manual 2013 SupplementThe CGEIT Review Questions, Answers & Explanations Manual 2013 Supplement features 60 new sample questions, answers and explanations to help candidates effectively prepare for the 2013 CGEIT exam. The questions are intended to provide CGEIT candidates with an understanding of the type and structure of questions that have typically appeared on past exams, and were prepared specifically for use in studying on the CGEIT exam.

    Member price: US $40.00 Nonmember price: US $60.00CGQ13ES

    CGEIT Review Questions, Answers & Explanations Manual 2014 SupplementThis manual features 60 new sample questions, answers and explanations to help candidates effectively prepare for the CGEIT exam. The questions are intended to provide CGEIT candidates with an understanding of the type and structure of questions that have typically appeared on past exams.

    Member price: US $40.00 Nonmember price: US $60.00CGQ14ES

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    18 192014 BOOKSTORE CATALOG

    Exam References Exam References

    CRISC PRODUCTS

    CRISC Review Manual 2014 The CRISCTM Review Manual 2014 is a comprehensive reference guide designed to help individuals prepare for the CRISC exam and understand IT-related business risk management roles and responsibilities. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed IT-related business risk management resource available worldwide.

    Member price: US $85.00 Nonmember price: US $115.00CRR14

    CRISC Review Questions, Answers & Explanations Manual 2014 SupplementThe CRISCTM Review Questions, Answers & Explanations Manual 2014 Supplement features of 100 new sample questions, answers and explanations to help candidates effectively prepare for the CRISC exam. The questions are intended to provide CRISC candidates with and understanding of the type and structure of questions that have typically appeared on past exams, and were prepared specifically for use in studying for the CRISC exam.

    Member price: US $40.00 Nonmember price: US $60.00CRQ13ES

    CRISC Review Questions, Answers & Explanations Manual 2013The publications is designed to familiarize candidates with the question types and topics featured in the CRISC exam. The 200 questions in this manual have been consolidated from the CRISCTM Review Questions, Answers & Explanations Manual 2011 and the CRISCTM Review Questions, Answers & Explanations Manual 2012 Supplement.

    Member price: US $40.00 Nonmember price: US $60.00CRQ14

    CRISC Review Questions, Answers & Explanations Manual 2013 SupplementThe CRISCTM Review Questions, Answers & Explanations Manual 2013 Supplement features of 100 new sample questions, answers and explanations to help candidates effectively prepare for the CRISC exam. The questions are intended to provide CRISC candidates with an understanding of the type and structure of questions that have typically appeared on past exams, and were prepared specifically for use in studying for the CRISC exam.

    Member price: US $40.00 Nonmember price: US $60.00CRQ14ES

    CRISC PRODUCTS (Continued)

    CRISC Practice Question Database 12 Months

    The CRISC Practice Question Database - 12 Month Subscription is a comprehensive 400-question pool of items that combine the questions from the CRISC Review Questions, Answers & Explanations Manual 2013 with those from the 2013 and 2014 editions of the CRISC Review Questions, Answers & Explanations Manual Supplement.

    Member price: Nonmember price: XMXCR14-12M

    CRISC Practice Question Database 6 Month Extension

    CRISC Practice Question Database - 6 Month Extension should be purchased only as an extension to the CRISC Practice Question Database - 12-Month SubscriptionExam candidates can take sample exams with randomly selected questions and view the results by job practice domain, allowing for concentrated study in particular areas. Additionally questions generated during a study session are sorted based on previous scoring history, allowing CRISC candidates to identify their strengths and weaknesses and focus their study efforts accordingly. Other features provide the ability to select sample exams by specific job practice domain, view questions that were previously answered incorrectly and vary the length of study sessions, giving candidates the ability to customize their study approach to fit their needs.

    Member price: US $45.00 Nonmember price: US $65.00XMXCR14-EXT180

    US $185.00US $225.00

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    20 212014 BOOKSTORE CATALOG

    Non-English Resources

    SPANISH

    CHINESE

    FRENCH

    ITALIAN

    JAPANESE

    ARABIC

    GERMAN

    HEBREW

    LITHUANIAN

    ROMANIAN

    RUSSIAN

    THAI

    TURKISH

    Section: 03NON-ENGLISH RESOURCES

    ESPAOL

    Manual de Preparacin al Examen CISA 2014El Manual de Preparacin al Examen CISA 2014 es una completa gua de referencia diseada para ayudar a quienes se preparan para el examen CISA, as como tambin para comprender los roles y las responsabilidades de un auditor de sistemas de informacin (SI). El manual ha sido mejorado y revisado por profesionales altamente calificados en las ltimas ediciones, por lo que representa el recurso disponible a nivel mundial ms actualizado y completo en auditora, aseguramiento, seguridad y control de sistemas de informacin (SI).

    Precio miembro: US $105.00Precio no miembro: US $135.00CRM14S

    Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2014El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2014 contiene 100 nuevas preguntas de ejemplo, respuestas y explicaciones, para ayudar a los candidatos a prepararse de forma efectiva el examen CISA. Estas nuevas preguntas estn diseadas para ser similares a las realmente empleadas en el examen. Las preguntas estn diseadas para ofrecer a los candidatos un entendimiento sobre el tipo y estructura de las preguntas que han aparecido habitualmente en exmenes anteriores, y han sido preparadas especficamente para su utilizacin en la preparacin del examen CISA.

    Precio miembro: US $40.00Precio no miembro: US $60.00QAE14SS

    Base de Datos de Preguntas de Prctica v14 CISALa Base de Datos de Preguntas de Prctica v14 CISA combina el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2013 con los Suplementos 2013 y 2014 del Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA (100 preguntas y respuestas cada uno) en un producto completo para estudio con 1150 preguntas. Los candidatos pueden tomar ejemplos de exmenes con preguntas seleccionadas al azar, y pueden ver los resultados por rea de prctica de trabajo, lo que permite que el candidato se concentre en un rea particular. Adems, las preguntas generadas durante una sesin de estudio estn clasificadas de acuerdo a la historia de calificaciones previas del usuario, lo que permite a los candidatos CISA identificar fcilmente sus puntos fuertes y dbiles y concentrar de esa manera su estudio de acuerdo a lo que necesiten.

    Precio miembro: US $185.00Precio no miembro: US $225.00Disponible en CD-ROM CDB14S o en versin de descarga CDB14SW.

    Information is todays currency. Yet the complexity of the business and technology environments continues to grow, with increasing legal and regulatory requirements, as well as more diverse and sophisticated security threats. As enterprises are faced with massive volumes of data, tightening privacy restrictions and a tangle of regulations, maximizing the value of an enterprises information and technology becomes a daily challenge. ISACA can help.

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    22 232014 BOOKSTORE CATALOG

    Non-English Resources Non-English Resources

    Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2013El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2013 contiene 100 nuevas preguntas de ejemplo, respuestas y explicaciones, para ayudar a los candidatos a prepararse de forma efectiva el examen CISA. Estas nuevas preguntas estn diseadas para ser similares a las realmente empleadas en el examen. Las preguntas estn diseadas para ofrecer a los candidatos un entendimiento sobre el tipo y estructura de las preguntas que han aparecido habitualmente en exmenes anteriores, y han sido preparadas especficamente para su utilizacin en la preparacin del examen CISA.

    Precio miembro: US $40.00Precio no miembro: US $60.00 QAE13SS

    Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM Suplemento 2014El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM Suplemento 2014 consta de 100 nuevas preguntas de ejemplo, sus respuestas y explicaciones para ayudar a los candidatos a prepararse efectivamente para el examen CISM. Estas nuevas preguntas estn diseadas para ser similares a las de los exmenes reales. Se busca que las preguntas brinden a los candidatos a CISM la comprensin del tipo y estructura de las preguntas que tpicamente han aparecido en exmenes anteriores, y fueron especficamente preparadas para ser utilizadas en la preparacin para el examen CISM.

    Precio miembro: US $40.00Precio no miembro: US $60.00 CQA14SS

    ESPAOL (Continuado)

    Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2013Diseado para familiarizar a los candidatos con los modelos de pregunta y temas encontrados en el examen CISA, el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2013 consta de 950 preguntas de estudio, de tipo seleccin mltiple, que aparecieron en el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2011 y los Suplementos 2011 y 2012 del Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA. Muchas preguntas han sido revisadas o escritas completamente de nuevo para representar mejor el formato de las preguntas en el examen CISA y/o brindar aclaraciones o explicaciones adicionales sobre la respuesta correcta. Estas no son preguntas reales del examen; pero se espera que proporcionen al candidato a CISA una mayor comprensin del tipo y la estructura de las preguntas y los temas que han aparecido anteriormente en el examen.

    Precio miembro: US $100.00Precio no miembro: US $130.00QAE13S

    Manual de Preparacin al Examen CISM 2014El Manual de Preparacin al Examen CISM 2014 es una gua completa de referencia diseada para ayudar a quienes se preparan para el examen CISM, as como a quienes desean comprender los roles y las responsabilidades de un gerente de seguridad de la informacin. El manual ha sido continuamente mejorado durante las diez ediciones anteriores, siendo un recurso global sobre el gerenciamiento de la seguridad de la informacin actualizado, completo, y pre-revisado por pares altamente calificados.

    Precio miembro: US $85.00Precio no miembro: US $115.00CM14S

    ESPAOL (Continuado)

    Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM Suplemento 2014El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM 2014 consiste en 815 preguntas de estudio de mltiple eleccin, respuestas y explicaciones que estn organizadas segn las reas de prctica de trabajo de CISM. Las preguntas de este manual han sido recopiladas desde el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM 2012 y los Suplementos 2012 y 2013 del Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM.

    Precio miembro: US $70.00Precio no miembro: US $90.00 CQA14S

    Controles estratgicos y operacionales de la TIJohn Kyriazogloul

    Tome el control de sus sistemas informticos y obtenga las recompensas que le ofrece el negocio. Todos estamos familiarizados con los beneficios que la informtica proporciona a los negocios. Sin embargo, los sistemas informticos desestructurados o mal controlados pueden sembrar el caos, ocasionar resultados inesperados e incluso amenazar su negocio a travs de crmenes informticos y de violaciones de seguridad. Para llevar estos riesgos al mnimo, cualquier sistema informtico necesita una serie de controles que aseguren el mximo beneficio de la tecnologa al mismo tiempo que una reduccin de las amenazas potencial para la empresa.

    Precio miembro: US $60.00 Precio no miembro: US $70.00 20ITCE

    Principios de Auditoria y Control de Sistemas de Informacion (Segunda Edicion)Manuel Tupia Anticona

    Esta publicacin rene las nuevas prcticas internacionalmente aceptadas para auditoria de sistemas y tecnologas de informacion informacin comunicaciones, con un lenguaje sencillo. Se detallan tanto los aspectos de gestin como los de carcter meramente tcnico basados en el cuerpo de conocimientos propuesto por ISACA internacional.

    Precio miembro: US $50.00Precio no miembro: US $60.00 ITCA2

    Computacin Forense: Descubriendo Los Rastros InformticosJeimy Cano

    En aos recientes, se ha visto un incremento en el nmero de delitos informticos, que han impactado considerablemente a la sociedad, para realizar investigaciones sobre delitos relacionados con las TIC se utilizan las tcnicas de cmputo forense, con el objetivo de preserver y analizar adecuadamente la evidencia digital que est tambin ligado a los aspectos legales que deben considerarse para presenter adecuadamente los resultados de la investigacin de la evidencia digital.

    Precio miembro: US $40.00 Precio no miembro: US $50.00 1AOCF

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    24 252014 BOOKSTORE CATALOG

    Non-English Resources Non-English Resources

    ESPAOL (Continuado)

    COBIT 5 FrameworkCOBIT 5 es el marco general que engloba negocio y gestin para el gobierno y la gestin de las TI de la empresa. Este volumen documenta los 5 principios de COBIT 5 y define los 7 catalizadores de apoyo que forman el marco. COBIT 5 es el nico marco de negocio para el gobierno y la gestin de las TI de la empresa. Esta versin evolucionada contiene las ltimas ideas en tcnicas de gobierno y gestin empresarial y ofrece principios universalmente aceptados, herramientas de anlisis y modelos para que aumente la confianza en y el valor de los sistemas de informacin.

    Precio miembro: US $35.00Precio no miembro: US $50.00Un libro electrnico gratuito CB5SS

    COBIT 5 ImplementationCOBIT 5 Implementacin tambin est disponible como descarga PDF gratuita para miembros de ISACA. Esta gua y COBIT 5 reconocen que la informacin y las tecnologas de la informacin relacionadas son generalizadas en las empresas y que no es posible, ni es buena prctica separar las actividades empresariales de las relacionadas con TI. Por lo tanto, el gobierno y la gestin de las TI de la empresa deberan implementarse como parte ntegra del gobierno de la empresa, cubriendo de extremo a extremo las reas de responsabilidad empresariales y funcionales de TI.

    Esta publicacin facilita un enfoque de buenas prcticas para implementar un gobierno TI de la empresa (GEIT, por sus siglas en ingls) basado en un ciclo de vida de mejora continua que debe disearse en funcin de las necesidades particulares de cada empresa.

    Precio miembro: US $35.00Precio no miembro: US $150.00Un libro electrnico gratuito CB5IGS

    2013 CISA (CISA Review Questions, Answers & Explanations Manual 2013) CISA 950 2011 CISA CISA (2011 and 2012 Supplements) 2011 2012CISA

    100 130 QAE13C

    2013 CISA (CISA Review Questions, Answers & Explanations Manual 2013 Supplement) 100 2014CISA CISA CISA

    40 60 QAE13CS

    CHINESE

    2014 CISA (CISA Review Manual 2014) CISA (IS)

    105 135 CRM14C

    2014 CISA (CISA Review Questions, Answers & Explanations Manual 2014 Supplement) 100 2014CISA CISA CISA

    40 60 QAE14CS

    COBIT 5: Enabling ProcessesCOBIT 5: Procesos Catalizadores tambin est disponible como descarga PDF gratuita para miembros de ISACA. Esta publicacin complementa a COBIT 5 y contiene una gua de referencia detallada de los procesos que estn definidos en el modelo de procesos de referencia de COBIT 5. COBIT 5: Procesos Catalizadores incluye La Cascada de Metas de COBIT 5, El Modelo de Procesos de COBIT 5 y El Modelo de Referencia de Procesos.

    Precio miembro: US $35.00 Precio no miembro: US $135.00Un libro electrnico gratuito CB5EPS

    COBIT 5 For Information SecurityCOBIT 5 para Seguridad de la Informacin es una Gua Profesional de COBIT 5. Examina COBIT 5 desde el punto de vista de la seguridad, mirando con un prisma de seguridad a los conceptos, catalizadores y principios de COBIT 5. El apndice B, Gua Detallada: Catalizador de Procesos se presenta en el mismo formato que las tablas de COBIT 5: Procesos Catalizadores y proporciona objetivos y mtricas de procesos, entradas/salidas y actividades, especficos para seguridad. COBIT 5 para Seguridad de la Informacin est destinado a todas las partes interesadas de la empresa, porque la seguridad de la informacin es responsabilidad de todas las partes interesadas de la empresa. Usarlo puede suponer beneficios para la empresa como mejores decisiones sobre riesgos y gestin de gastos relacionados con la funcin de seguridad de la informacin.

    Precio miembro: US $35.00 Precio no miembro: US $175.00Un libro electrnico gratuito

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    26 272014 BOOKSTORE CATALOG

    Non-English Resources Non-English Resources

    COBIT 5 ImplementationCOBIT 5 PDF ISACA COBT 5 IT IT IT IT

    35 150 CB5IGC

    FRANAIS

    Manuel de Prparation CISA 2014Le Manuel de Prparation CISA 2014 est un guide de rfrence exhaustif destin aider les candidats se prparer lexamen CISA et comprendre les rles et les responsabilits dun auditeur informatique. Le Manuel a t amlior par rapport aux ditions antrieures. Rvis par des pairs, il reprsente la ressource en audit, assurance, scurit et contrle des systmes dinformation la plus jour et la plus complte disponible travers le monde.

    Prix membres : 105.00 $ USPrix non-membres : 135.00 $ USCRM14F

    Manuel Complmentaire CISA 2014: Questions, Rponses et ExplicationsLe Manuel Complmentaire CISA 2014: Questions, Rponses et Explications contient 100 nouvelles questions, leurs rponses et des explications pour aider les candidats prparer efficacement lexamen CISA. Ces nouvelles questions sont conues lidentique des questions dun examen rel. Les questions visent donner au candidat lexamen CISA une bonne comprhension des structures et des types de questions qui ont t poses lors des examens prcdents. Ces questions ont t ralises spcialement pour la prparation lexamen CISA.

    Prix membres : 40.00 $ USPrix non-membres : 60.00 $ USQAE14FS

    Manuel Complmentaire CISA 2013: Questions, Rponses et ExplicationsLe Manuel Complmentaire CISA 2013 : Questions, Rponses et Explications contient 100 nouvelles questions, leurs rponses et des explications pour aider les candidats prparer efficacement lexamen CISA. Ces nouvelles questions sont conues lidentique des questions dun examen rel. Les questions visent donner au candidat lexamen CISA une bonne comprhension des structures et des types de questions qui ont t poses lors des examens prcdents. Ces questions ont t ralises spcialement pour la prparation lexamen CISA.

    Prix membres : 40.00 $ USPrix non-membres : 60.00 $ USQAE13FS

    CHINESE (Continued)

    COBIT 5 FrameworkCOBIT 5IT COBIT 5IT

    100 130 CB5C

    COBIT 5: Enabling ProcessesCOBIT 5 PDF ISACA COBIT 5 COBIT 5 COBIT 5

    35 135 CB5EPC

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    28 292014 BOOKSTORE CATALOG

    Non-English Resources Non-English Resources

    Manuale di Esercitazione CISA 2013: Domande, Risposte e SpiegazioniConcepito per familiarizzare il candidato con il tipo di domande e gli argomenti dellesame CISA, il Manuale di esercitazione CISA 2013: Domande, Risposte e Spiegazioni consiste di 950 domande a scelta multipla, tratte dal Manuale di esercitazione CISA 2011: Domande, Risposte e Spiegazioni e dai Supplementi 2011 e 2012. Molte domande sono state riadattate o totalmente riformulate per adeguarsi meglio al formato corrente delle domande desame CISA e/o a scopo di maggior chiarezza o migliore spiegazione della risposta esatta. Queste domande possono essere o no analoghe a quelle che compaiono allesame vero e proprio e sono fornite al candidato CISA per agevolare la comprensione del tipo e della struttura di domande e contenuti che sono precedentemente apparsi nellesame.

    Prezzo socio: $ USA 100.00 Prezzo non socio: $ USA 130.00QAE13I

    Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2013Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2013 contiene 100 nuove domande esemplificative, con risposte e spiegazioni per aiutare i candidati a prepararsi con efficacia allesame CISA. Queste nuove domande sono presentate in modo da costituire una simulazione desame. Le domande hanno lo scopo di consentire al candidato di capire il tipo e la struttura delle domande presenti negli esami precedenti e sono state formulate specificatamente per essere utilizzate nella preparazione allesame CISA.

    Prezzo socio: $ USA 40.00 Prezzo non socio: $ USA 60.00QAE13IS

    ITALIAN (Continued)

    IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud (Italian)Il cloud computing un importante tema emergente nel mondo economico di oggi. Come seguito al documento pubblicato nellottobre 2009, ISACA ha realizzato questa edizione per approfondire lassurance del cloud computing. Lattenzione si concentra sui controlli e sulle contromisure da utilizzare nel cloud, ma esamina anche come adottare il cloud per creare valore nei sistemi aziendali. Il libro illustra questa soluzione e la sua importanza per le imprese, i rischi e la necessit di unattivit di assurance facilitata da COBIT.

    Prezzo membro: GRATIS Non membri Prezzo: US $50.00WITCOCI

    ITALIAN

    Manuale Tecnico CISA 2014 Manuale Tecnico CISA 2014 una guida di riferimento completa concepita per aiutare i candidati nella preparazione dellesame CISA e nella comprensione dei ruoli e delle responsabilit di un auditor informatico. Il manuale stato migliorato rispetto alle passate edizioni e rappresenta oggi la fonte di riferimento pi attuale, esaustiva e autorevole a livello mondiale nel campo dellIT audit e della gestione della sicurezza delle informazioni.

    Prezzo socio: $ USA 105.00 Prezzo non socio: $ USA 135.00CRM14I

    Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2014 Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2014 contiene 100 nuove domande esemplificative, con risposte e spiegazioni per aiutare i candidati a prepararsi con efficacia allesame CISA. Queste nuove domande sono presentate in modo da costituire una simulazione desame. Le domande hanno lo scopo di consentire al candidato di capire il tipo e la struttura delle domande presenti negli esami precedenti e sono state formulate specificatamente per essere utilizzate nella preparazione allesame CISA.

    Prezzo socio: $ USA 40.00 Prezzo non socio: $ USA 60.00QAE14IS

    JAPANESE

    2014 (CISA2014(CISA) CISACISAIS

    : US $105.00 : US $135.00CRM14J

    2013CISA& 2013CISA CISA9502011CISA20112012CISA()2011CISACISACISA2014CISA2013CISA2014CISA

    : US $100.00 : US $130.00QAE13J

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    30 312014 BOOKSTORE CATALOG

    Non-English Resources Non-English Resources

    JAPANESE(Continued)

    2014CISA2014CISA& (CISA100CISA2014CISA 2013CISA

    : US $40.00 : US $60.00 QAE14JS

    2013CISA&)2013CISA) CISA100CISA2014CISA2013CISA

    : US $40.00 : US $60.00 QAE13JS

    2012 (CISM) 2012CISMCISM10

    : US $85.00 : US $115.00 CM12J

    JAPANESE(Continued)

    COBIT 5: Enabling ProcessesCOBIT 5: Enabling ProcessISACAPDFCOBIT 5COBIT 5 COBIT 5

    35.00 US135.00 USCB5EPG

    COBIT 5 ImplementationCOBIT 5: ImplementationISACAPDF COBIT 5 ITITIT (GEIT)

    35.00 US150.00 USCB3IGJ

    COBIT 5 FrameworkCOBIT 5ITCOBIT 57 COBIT 5IT

    : US $35.00 : US $50.00CB5J

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    32 332014 BOOKSTORE CATALOG

    Non-English Resources Non-English Resources

    HEBREW

    COBIT 5 COBIT 5 . COBIT 5 .

    , , / . COBIT , -21. COBIT 5 , , , , .

    : US $40.00 : US $60.00 CB5H

    LITHUANIAN

    COBIT 5 FrameworkCOBIT 5 yra visa apimanti veiklos valdymo metodika, skirta organizacijos IT valdymui ir vadovavimui. ioje knygoje pateikiami 5 COBIT 5 principai ir apraomos metodikos pagrind sudaranios 7 realizavimo priemons. COBIT 5 yra vienintel veiklos valdymo metodika, skirta organizacijos IT valdymui ir vadovavimui. i evoliucin versija pateikia naujausi poir organizacijos IT valdymo ir vadovavimo metodus, naudodama visame pasaulyje pripaintus principus, analitines priemones ir modelius, leidianius labiau pasitikti informacinmis sistemomis ir gauti i j didesn vert.

    Member price: US $35.00 Nonmember price: US $50.00Nemokamai ebookCB5L

    ARABIC

    COBIT 5 Framework 5 . .

    . . ()

    : US $35.00 : US $50.00 CB5AR

    GERMAN

    COBIT 5 FrameworkCOBIT 5 ist das bergreifende Business- und Management-Rahmenwerk fr die Governance und das Management der Unternehmens-IT. Dieser Band dokumentiert die fnf Grundstze von COBIT 5 und definiert 7 untersttzende Enabler, die das Rahmenwerk bilden. COBIT 5 ist das einzige Business-Rahmenwerk fr die Governance und das Management der Unternehmens-IT. Diese weiterentwickelte Version enthlt die neusten Entwicklungen auf dem Gebiet der Unternehmens-Governance und den Managementtechniken, und stellt allgemein akzeptierte Grundstze, analytische Werkzeuge und Modelle zur Verfgung, um zu helfen, das Vertrauen in und Wert von Informationssystemen zu vergrern.

    Mitgliederpreis: 35,00 USD. Preis fr Nicht-Mitglieder: 50,00 USD.Ein kostenloses E-BookCB5G

    COBIT 5: Enabling ProcessesBitte beachten Sie, dass COBIT 5: Enabling Processes fr ISACA-Mitglieder auch als kostenloser PDF-Download zur Verfgung steht. Diese Publikation ergnzt COBIT 5 und enthlt einen detaillierten Referenz-Leitfaden zu den Prozessen, die im COBIT 5 Prozessreferenzmodell definiert werden. Sie enthlt die COBIT 5 Ziel-Kaskade, das Prozessmodell und Prozessreferenzmodell. C13

    Member Price: US $35.00 Nonmember Price: US $135.00Ein kostenloses E-BookCB5EPG

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    34 352014 BOOKSTORE CATALOG

    Non-English Resources Non-English Resources

    ROMANIAN

    COBIT 5 FrameworkCOBIT 5 este cadrul de referin general pentru guvernarea i managementul IT din cadrul organizaiilor. Acest volum documenteaz cele cinci principii ale COBIT 5 i definete 7 catalizatori suport care alctuiesc cadrul de referin. COBIT 5 este singurul cadru de referin adresabil afacerilor pentru guvernarea i managementul IT n cadrul organizaiilor. Aceast versiune evolutiv ncorporeaz cele mai recente opinii cu privire la tehnicile de guvernare i management i ofer principii acceptate la nivel mondial, instrumente analitice i modele care ajut la creterea ncrederii n, i valoarea rezultat din sistemele informaionale.

    Pre pentru membri: US 35.00 Pre pentru nonmembri: US 50.00Un eBook gratuitCB5R

    COBIT 5: Enabling Processes V rugm s reinei c manualul COBIT 5: Procese catalizatoare este de asemenea disponibil ca fiier pdf, descrcabil gratuit de ctre membrii ISACA. Aceast publicaie completeaz COBIT 5 i conine un ghid detaliat al proceselor definite n modelul de referin al proceselor din COBIT 5. Manualul include de asemenea i succesiunea obiectivelor COBIT 5 i modelul de referin al proceselor.

    Pre pentru membri: US 35.00 Pre pentru nonmembri: US 135.00Un eBook gratuitCB5EPR

    RUSSIAN

    COBIT 5 FrameworkCOBIT 5 - . COBIT 5 , . COBIT 5 , . , , , , , .

    : US $ 35.00, : US $ 50.00. CB5RU

    THAI

    COBIT 5 Framework COBIT 5 5 COBIT 5 7

    / COBIT 21 COBIT 5

    : US $35.00 : US $50.00eBook CB5TH

    TURKISH

    COBIT 5: Enabling ProcessesCOBIT 5: Gerekletirme Sreleri ISACA yelerine cretsiz olarak pdf formatnda www.isaca.org sitesinden sunulmaktadr. COBIT 5: Gerekletirme Sreleri, COBIT 5in iinde tanmlanan sre referans modelinin detaylarn, hedef basamaklarn ve olgunluk modelini tanmlamaktadr.

    ISACA yelerine: US $35.00 dur ve ye olmayanlara US : US $135.00 cretsiz kitapCB5EPT

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    36 372014 BOOKSTORE CATALOG

    RISK Related

    RISK RELATED

    In business today, strong support from IS/IT is an indispensable component of any company, and can be what separates good companies from great ones. Business leaders know that its not technology per se but the ability to use it wisely that counts. Helping businesses make that transition requires more than just problem solvers. ISACA invests in research that grows knowledge and results in the development of innovative thinking that security professionals can leverage in their everyday functions and strategies for the future.

    Information Technology Risk Management in Enterprise EnvironmentsJake Kouns and Daniel Minoli

    This book provides a comprehensive review of industry approaches, practices and standards on how to handle the ever-increasing risks to organizations business-critical assets. Through a practical approach, this book explores key topics that enable readers to uncover and remediate potential infractions.

    Member: US $104.00Nonmember: US $114.00 84WRM

    Advanced Persistent Threats: How to Manage the Risk to Your Business ISACA

    An APT to the organization and practical measures that can be taken to prevent, detect and respond to such an attack. In addition, it highlights key differences between the controls needed to counter the risk of an APT attack and those commonly used to mitigate everyday information security risk.

    Member: US $35.00 Nonmember: US $60.00Available in print APT and eBook WAPT formats

    The Failure of Risk Management: Why Its Broken and How to Fix ItDouglas W. Hubbard

    An essential guide to the calibrated risk analysis approach, this book takes a close look at misused and misapplied basic analysis methods. Using examples from the credit crisis, natural disasters, outsourcing, engineering disasters and more, the author reveals critical flaws in risk management methods and how these problems can be fixed.

    Member: US $50.00Nonmember: US $60.00 78WRM

    How to Complete a Risk Assessment in 5 Days or Less Thomas R. Peltier

    This is what risk assessment is all about. This book demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation, this book includes user-friendly checklists, forms, questionnaires and sample assessments.

    Member: US $92.00Nonmember: US $102.00 11CRC8

    Section: 04

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    38 392014 BOOKSTORE CATALOG

    RISK Related RISK Related

    IT Risk: Turning Business Threats Into Competitive AdvantageGeorge Westerman and Richard Hunter

    Based on research conducted by the Massachusetts Institute of Technology (MIT)s Center for Information Systems Research and Gartner Inc., this book helps enterprises focus on the most pressing risks and leverage the upside that comes with vigilance. Traditionally, managers have grouped technology risk and funding into silos. IT Risk outlines a new model for integrated risk management, which identifies three core areas that can be developed to eliminate the problems that silo strategies create.

    Member: US $35.00Nonmember: US $45.002HBS

    The Operational Risk Handbook for Financial CompaniesBrian Barnier

    Range of proven operational risk techniques from other industries and disciplines to the troubled territory of financial services. The author introduces a range of sophisticated, dependable andcruciallyapproachable tools for risk evaluation, risk response and risk governance. He provides a more robust way of gaining a better picture of risks, shows how to build risk-return awareness into decision making, and explores how to fix (and not just report) risk.

    Member: US $53.00Nonmember: US $63.001HOP

    1001010101010101010101010101010101010101010101010101

    100101010101010101010101010

    0101010101010101010101

    1001010101010101010101010101010101010101010101010101

    1001010101010101010101010101010101010101010101010101

    1001010101010101010101010101010101010101010101010101

    10010101010101

    1010101010101010101010101010101010101

    10101010101010101010101010101010101010101010101010

    10101010101010101010101

    1

    10101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101

    10101010101010101010101010101010

    1001010101010101010101010101010101010101010101010101

    100101010101010101010101

    1

    0101010101010101

    1001010101010101010101010101010101010101010101010101

    1001010101010101010101010101010101010101010101010101

    1001010101010101010101010101010101010101010101010101

    1001010101010101010

    01010101010101

    101010101010101

    101010101010101010101010101010101

    010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101

    1010101010101010

    10101010101010101010101010101010101010101010101010

    100101010101010101010101010101010101010

    010101010

    1001010101010101010101010101010101010101010101010

    1001010101010101010101010101010101010101010101010

    1001010101010101010101010101010101010101010101010

    100101010101010

    10101010101010

    1001010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    10101010101010101010101010101010101010101010101010

    101010101010101

    0101010101010101010101010

    10101010101010101010101010101010101010101010101010

    100101010101010

    0

    101010101010101010

    100101010101010101010101010101010101010101010101010

    100101010101010101010101010101010101010101010101010

    100101010101010101010101010101010101010101010101010

    10010101010101

    1010101010101010101010101010

    1010101010101010

    010

    0101010101010101

    1010101010101010101010101010101010101010101010101

    1010101010101010101010101010101010101010101010101

    1010101010101010101010101010101010101010101010101

    1010101010101

    01010101010101010101010101

    1001010101010101

    10

    1010101010101010

    1001010101010101010101010101010101010101010101010

    1001010101010101010101010101010101010101010101010

    1001010101010101010101010101010101010101010101010

    100101010101

    01010101010101010101010101010101010

    The Economic Impact of Cyber Crime and Cyber Espionage, Center for Strategic and International Studies, July 2013. 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013. 2012 IBM Global Reputational Risk and IT Study. The Risk of Insider Fraud, Ponemon Institute, February 2013. Pulse of the Profession, IIA, 2013. 2013 Internal Audit Capabilities and Needs Survey Report, Protiviti. Global Risk Management Survey 2013, Aon Risk Solutions. 2013 Pulse of the Profession, Project Management Institute, March 2013. COBIT 5 for Risk, ISACA, 2013.

    SOURCES:

    THE IT RISK EFFECT Failing to include technology risk in enterprise risk can have major impact

    62%FORTUNE 500

    CHIEF AUDIT EXECUTIVES with no plans to increase

    focus on IT

    45% Auditors with

    NO PLANS TO INCLUDE SOCIAL MEDIA RISK

    in audits

    46% C-LEVEL EXECUTIVES who say that customer

    satisfaction is very much affected by

    IT risk

    $135 MILLION

    Amount at risk for every $1 billion that

    companies spend1+

    PER WEEKAverage number of

    EMPLOYEE-RELATED FRAUD incidents in past

    12 months

    $100 BILLION

    Annual losses due to cybercrime

    $157 PER RECORD

    Cost when data breach caused by hacker or other

    cybercriminal

    #6 Ranking of FAILURE

    TO INNOVATE on Top 10 Global

    Risk list

    20 RISK SCENARIO

    categories addressed in COBIT 5 for Risk

    ISACA Published White Papers

    ISACA has issued white papers to provide constituents with practical and pragmatic information that is timely and relevant regarding issues that impact enterprise operations.

    Each white paper is provided as a complimentary PDF download, and a link for your feedback is provided on each white paper landing page. Your feedback is a very important element in the process of the development of ISACA guidance for our constituents.

    Please visit www.isaca.org/whitepapers to download and comment on these valuable resources.

    Advanced Persistent Threat Awareness Study Results

    Big Data: Impacts and Benefits

    Business Continuity Management: Emerging Trends

    Calculating Cloud ROI: From the Customer Perspective

    Cloud Computing Market Maturity Study Results

    Cloud Governance: Questions Boards of Directors Need to Ask

    Generating Value From Big Data Analytics

    Guiding Principles for Cloud Computing Adoption and Use

    Incident Management and Response

    Privacy and Big Data Aug

    Security As A Service

    Security Considerations for Cloud Computing

    Virtualization Desktop Infrastructure (VDI)

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    402014 BOOKSTORE CATALOG

    ESSENTIALS

    SPECIFIC ENVIRONMENTS

    Section: 05AUDIT, CONTROL, SECURITY

    ISACAs diverse library of audit/assurance programs includes a wide range of topics focused on a boundless mix of interests, talents and experiences. ISACA Audit/Assurance programs provide a globally tested approach for balancing risk, value and the use of resources. It helps leaders deliver on their business strategy through effective information and technology execution.

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    42 432014 BOOKSTORE CATALOG

    Audit, Control, Security Audit, Control, Security

    Essentials

    The Definitive Guide to the C&A TransformationDavid Coderre

    The first comprehensive manual that sets out to explain current standards and best practices. This book provides all the information needed to recognize, implement and manage the relevant authorization requirements, and, therefore, to achieve compliance with federal, local and agency laws and policies.

    Member: US $70.00Nonmember: US $80.00 13ITCAT

    The Essential Guide to Internal Auditing, 2nd EditionK. H. Spencer Pickett

    This guide is essential for internal auditors. Learn the audit context and how it fits into the wider corporate agenda. This edition is set firmly within the corporate governance, risk management and internal control arena. It includes expanded coverage of risk management and is updated throughout to reflect the new Institute of Internal Auditors (IIA) standards and current practice advisories. It also includes many helpful models, practical guidance and checklists.

    Member: US $55.00Nonmember: US $65.00 92WIA

    ESSENTIALS (Continued)

    Data Protection: Governance, Risk Management, and ComplianceDavid G. Hill

    Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection.

    Member: US $80.00Nonmember: US $90.00 51CRC

    Effective Project Management: Traditional, Agile, Extreme, 6th EditionRobert K. Wysocki

    Many projects fail to deliver on time and within budget, and often poor project management is to blame. The newest edition of this expert and top-selling book helps project managers avoid the pitfalls and manage projects successfully. Covering the major project management techniques including traditional (linear and incremental), agile (iterative and adaptive) and extreme, this book lays out a comprehensive overview of all of the best-of-breed project management approaches and tools today.

    Member: US $60.00Nonmember: US $70.00 50WPM6

    Build Your Own Security Lab: A Field Guide for Network TestingMichael Gregg

    Those whose job is to design or implement IT security solutions, or who are studying for any security certification, will benefit from this how-to guide. This publication teaches readers how to assess needs, gather the tools and create a controlled environment in which to experiment, test and develop solutions that work. With liberal examples from real-world scenarios, it tells the reader how to implement a strategy to secure systems

    Member: US $50.00Nonmember: US $60.00 76WSL

    Building an Effective Information Security Policy ArchitectureSandy Bacik

    Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. For these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. This guide for security professionals explains how to review, develop and implement a security architecture for any size enterprise, whether it is a global company or a server message block.

    Member: US $88.00Nonmember: US $98.00 43CRC

    ESSENTIALS

    Access Control, Security, and Trust: A Logical ApproachShiu-Kai Chin and Susan Beth Older

    This book equips readers with an access control logic that they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.

    Member: US $100.00Nonmember: US $110.00 48CRC

    Accounting Information Systems, 9th EditionUlric J. Gelinas, Richard B. Dull and Patrick Wheeler

    Todays accounting professionals are challenged to identify enterprise risks and provide quality assurance for a companys information systems focuses on critical accounting information systems in use today and controls for maintaining these systems.

    Member: US $261.00Nonmember: US $271.00 1IT9

    Auditing and Assurance Services: Understanding the Integrated AuditKaren L. Hooks

    This publication discusses the auditing professions requirement to focus on the integrated audit in the wake of the Sarbanes-Oxley Act. It also outlines the impact of the Public Company Accounting and Oversight Board (PCAOB) on the auditing of public companies.

    Member: US $237.00Nonmember: US $247.00 93WAAS

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    44 452014 BOOKSTORE CATALOG

    Audit, Control, Security Audit, Control, Security

    IT Auditing Using Controls to Protect Information Assets, 2nd EditionChris Davis, Mike Schiller and Kevin Wheeler

    Filled with solid techniques, checklists, forms, coverage of leading-edge tools and systematic procedures for common IT audits, IT Auditing, 2nd Edition covers real-life scenarios and fosters the skills necessary for auditing complex IT systems. Fully updated to cover new technology including cloud computing, virtualization and storage, the book provides guidance on creating an effective and value-added internal IT audit function. Information is presented in easy-to-follow sections, allowing you to quickly grasp critical and practical techniques.

    Member: US $70.00Nonmember: US $80.00 15MIT2

    ESSENTIALS (Continued)

    Essentials of Corporate FraudTracy Coenen

    Full of valuable tips, techniques, illustrative real-world examples, exhibits and best practices, this handy and concise paperback will help you stay up to date on the thinking, strategies, developments and technologies in corporate fraud. Essentials of Corporate Fraud challenges the readers concept of corporate fraud, providing an introductory look at fraud and the kinds of fraud that can occur in various areas of a company.

    Member: US $48.00Nonmember: US $58.00 71WCF

    Fraud Analysis Techniques Using ACLDavid Coderre

    Fraud Analysis Techniques Using ACL offers auditors & investigators: Authoritative guidance on the use of computer-

    assisted audit tools and techniques in fraud detection A CD-ROM containing an educational version of ACL An accompanying CD-ROM containing a thorough

    fraud tool kit with two sets of customizable scripts to serve your specific audit needs

    Case studies and sample data files that you can use to try out the tests

    Step-by-step instructions on how to run the tests A self-study course on ACL script development with exercises, data files and suggested answers.

    Member: US $211.00Nonmember: US $221.00 82WCL

    Essentials

    Information Security and Privacy: A Practical Guide for Global Executives, Lawyers and TechnologistsThomas J. Shaw Esq. (Editor)

    Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involved in information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country in which they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools needed to handle the business, legal and technical risk of protecting information on a global scale.

    Member: US $120.00Nonmember: US $130.00 2ABA

    Information Technology Control and Audit, 4th EditionSandra Senft and Frederick Gallegos

    The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trends and defines recent advances in technology that impact IT controls and auditsincluding cloud computing, web-based applications, and server virtualization.

    Member: US $90.00Nonmember: US $100.00 4CRC4

    ESSENTIALS (Continued)

    Interpretation and Application of International Standards on AuditingSteven Collings

    In recent years, auditing has undergone significant changes, due in large part to well-publicized corporate disasters such as Enron and Parmalat, which have shaken the profession. In response, many countries have replaced preexisting domestic standards with International Standards on Auditing (ISAs) in an attempt to ensure that auditors throughout the world apply the same level of work during all audit assignments, and that audit quality remains consistent on a global basis.

    Member: US $110.00Nonmember: US $120.00 95WISA

    IT Audit, Control, and SecurityRobert Moeller

    When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control and security, the book describes the types of internal controls, security and integrity procedures that management must build into its automated systems. This timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

    Member: US $90.00Nonmember: US $100.00 90WACS

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    46 472014 BOOKSTORE CATALOG

    Audit, Control, Security Audit, Control, Security

    ESSENTIALS (Continued)

    IT Control Objectives for Basel II: The Importance of Governance and Risk Management for ComplianceISACA

    IT Control Objectives for Basel II provides a framework for managing operational and information risk in the context of Basel II. It presents an outline of risk under Basel II, links between operational risk and IT risk, and an approach for managing information risk. This publication addresses three groupsinformation risk managers, IT practitioners and financial services experts. The executive summary states that financial services organizations using the framework presented are able to apply recognized IT control objectives and management processes to address the role of IT in operational risk.

    Member: US $20.00Nonmember: US $50.00Available in print ITCOB and eBook WITCOB

    IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud ISACA

    Cloud computing has become an important emergent issue in business today. As a follow-up to the white paper it issued in October 2009, ISACA has produced this book to examine assurance in the cloud.

    The book focuses on controls and countermeasures that can be used in the cloud, and closely examines how to use the cloud to create value in systems. The book details the issue, why it is important to business, risks, why assurance is critical and how COBIT can help.

    The book contains an audit program in the appendix, which is also available as a Word document.

    Member: US $35.00Nonmember: US $60.00Available in print ITCOC and eBook WITCOC

    IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data Lance HaydenLance Hayden

    IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies.

    Member: US $50.00Nonmember: US $60.00 22MSM

    Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

  • 48

    Audit, Control, Security

    Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    492014 BOOKSTORE CATALOG

    Audit, Control, Security

    ESSENTIALS (Continued)

    IT Strategic and Operational ControlsJohn Kyriazoglou

    Nowadays, integrated information systems can significantly magnify the accrued benefits of a given project and greatly strengthen an organization, but such benefits are balanced by a serious risk. If IT systems are not used in a disciplined manner, they can create havoc and frequently bring about unexpected results and catastrophe, as shown by the rise in security incidents and computer-based crimes.

    This book is an ideal tool for those without specialized technical expertise who are seeking to understand IT controls and their design, implementation, monitoring, review and audit issues.

    Member: US $60.00Nonmember: US $70.00 6ITSOC

    A New Auditors Guide to Planning, Performing, and Presenting IT AuditsNelson Gibbs, Divakar Jain, Amitesh Joshi, Surekha Muddamsetti and Sarabjot Singh

    Information technology is a highly dynamic, rapidly changing environment. IT auditors are expected to stay current with the latest tools, technologies and trends, and may need to do additional research to prepare for specific audits. This book is designed to help aspiring and active internal auditors take a step back and understand the general processes and activities involved in conducting an audit around technology.

    Member: US $70.00Nonmember: US $80.00 1IIA

    PCI Compliance, 3rd Edition Understand and Implement Effective PCI Data Security Standard ComplianceAnton Chuvakin and Branden R. Williams

    The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.

    Member: US $60.00Nonmember: US $70.00 7SYN10

    SAP Security and Risk Management, 2nd EditionMario Linkies and Horst Karin

    The revised and expanded second edition of this best-selling book describes all requirements, basic principles and best practices of security for an SAP system. Readers learn how to protect each SAP component internally and externally while also complying with legal requirements. Furthermore, the book describes how to master the interaction of these requirements to provide a holistic security and risk management solution. Using numerous examples and step-by-step instructions, this book teaches the reader the technical details of implementing security in SAP NetWeaver.

    Member: US $70.00Nonmember: US $80.00 2SAPP

    ESSENTIALS (Continued)

    Security Metrics: A Beginners GuideCaroline Wong

    Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of the enterprise. Security Metrics: A Beginners Guide explains, step by step, how to develop and implement a successful security metrics program.

    Member: US $40.00Nonmember: US $50.00 28MSM

    SOC 2: A User GuideISACA

    SOC 2 is a Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy. This guide is intended for those evaluating a service organizations SOC 2 report as part of a governance, risk and compliance (GRC) program; vendor assessment; security evaluation; business continuity plan, or other control evaluation. It may also be useful to those considering requesting a SOC 2 report from an existing vendor that does not currently provide a report or from a new vendor as part of the due-diligence or request-for-proposal (RFP) process. AICPA and ISACA have jointly released this guide to provide user entities with the information they need when interpreting the SOC 2 reports received from service organizations.

    Member: US $35.00 Nonmember: US $75.00Available in print SOC and eBook WSOC

    Once more the Unto the Breach: Managing information Security in an Uncertain WorldAndrea Simmons

    In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insiders view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project

    Member: US $46.00Nonmember: US $56.0014ITOM

    Auditors Guide to IT Auditing and Software Demo, 2nd Edition Richard E. Cascarino

    Many Auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Auditors Guide to IT Auditing presents an easy, practical guide for auditors that can be applied to all computing environments.

    Follow the approach used by the Information System Audit and Control Associations model curriculum, making this book a practical approach for IS auditing

    Serves as an excellent study guide for those preparing for the CISA and CISM exams

    Includes discussion of risk evaluation methodologies, new regulations, SOX, privacy, banking, IT governance, COBIT, outsourcing, network management and the Cloud

    Member: US $95.00Nonmember: US $105.00 53WAG2

  • Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads

    50 512014 BOOKSTORE CATALOG

    Audit, Control, Security Audit, Control, Security

    Protecting Industrial Control Systems From Electronic ThreatsJoe Weiss

    Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cybersecurity is getting much more attention and SCADA security (supervisory control and data acquisition) is a particularly important part of this field, as are distributed control systems (DCS), programmable logic controllers (PLCs), remote terminal units (RTUs), intelligent electronic devices (IEDs), and all other field controllers, sensors, drives and emission controls that make up the intelligence of modern industrial buildings and facilities.

    Member: US $109.00Nonmember: US $119.00 1MPPI

    Security, Audit and Control Features Oracle Database, 3rd EditionISACA

    Protecting information assets is challenging for every enterprise, regardless of size and industry, and it has become an even more complex task for enterprises adopting distributed computing environments.Security, Audit and Control Features Oracle Database, 3rd Edition provides a new perspective of security and controls over Oracle. This updated edition includes a background and review of security controls and addresses the risks associated with protecting information in a distributed computing environment of various platforms, versions, interfaces and tools.

    Member: US $40.00Nonmember: US $55.00 ODB9

    SPECIFIC ENVIRONMENTS

    Applied Oracle Security: Developing Secure Database and Middleware EnvironmentsDavid Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark and Bryan Wise

    This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle Database and Oracle Middleware environments. Readers will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and Secure Business Intelligence Applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in todays IT world.

    Member: US $60.00Nonmember: US $70.00 18MAO

    Identity Management: Concepts, Technologies, and SystemsElisa Bertino and Kenji Takahashi

    Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enh