Bookstore-2014-Catalog Bro Eng 0314
-
Upload
envisage123 -
Category
Documents
-
view
37 -
download
0
description
Transcript of Bookstore-2014-Catalog Bro Eng 0314
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
12014 BOOKSTORE CATALOG
YOUR LEADING
2014 BOOKSTORE CATALOGisaca.org/bookstore
RESOURCE FOR SUCCESS
-
2 32014 BOOKSTORE CATALOG
THOUGHT LEADERSHIPEquip yourself with knowledge critical to thinking strategically and navigating todays complex IT issues. From surveys and whitepapers to frameworks, standards and research publications, ISACA has what you need.
ISACA JOURNALGet access to cutting-edge, front-line perspectives on emerging trends, developing risks and professional development.
ISACA BOOKSTOREExplore a peer-reviewed collection of industry publications, including COBIT 5 products and exam resources for insights and guidance that youll never want to be without.
ISACAS eLIBRARYBrowse over 575 titles on demand to supplement your knowledge and sharpen your skills.
KNOWLEDGE CENTERDont face your technology challenges alone. Connect and collaborate with like-minded professionals on topics of mutual interest and share your real-world experiences.
ADVOCACYShare your expertise and experience to enhance the awareness and influence of our association. Our advocacy efforts help build and promote the importance, integrity and value of ISACA credentials and knowledge on a global scale
WHATS INSIDE... RESEARCH & RESOURCESTABLE OF CONTENTS
4 COBIT PRODUCTS
COBIT 5 & Related Products
COBIT 4.1 & Related Products
14 EXAMINATION REFERENCE MATERIALS
CISA
CISM
CGEIT
CRISC
20 NON-ENGLISH RESOURCES
36 RISK-RELATED
41 AUDIT, CONTROL and SECURITY RELATED
Essentials
Specific Environments
54 INTERNET & RELATED SECURITY TOPICS
65 IT GOVERNANCE & BUSINESS MANAGEMENT
80 INVENTORY REDUCTION SALE
83 TITLE INDEX
KNOWLEDGE, COMMUNITY AND GUIDANCE HELP DELIVER ENTERPRISE VALUE WORLDWIDE
By working collectively with our global community of thought leaders, innovators and professionals, ISACA develops globally accepted research, standards, frameworks and guidance that enhance the profession and support enterprise success worldwide. This ability to leverage member expertise makes ISACA the most trusted resource for thought leadership and advocacy in IT audit, compliance, security, risk, privacy and governance for industries, enterprises and individuals.
Our goal is to make members more valued, knowledgeable and capable of illuminating opportunities, exposing risks and revealing the road ahead for organizations all over the globe.
-
4 52014 BOOKSTORE CATALOG
The collective wisdom and practical expertise of global experts helped shape the COBIT 5 framework, which represents the most significant evolution in COBITs 16-year history. It went through a public exposure period and also was reviewed by more than 95 governance, security, risk and assurance professionals worldwide.
Business and IT leaders need up-to-date tools and expertise to navigate an increasingly complex business and IT environment. COBIT 5 can help. It represents the next generation of ISACAs guidance, unifying previous frameworks and standards.
COBIT 5
COBIT 5 Enabler Guides
COBIT 5 Professional Guides
COBIT 5 Implementation
COBIT 5: Enabling Processes
COBIT 5 For Information Security
COBIT 5: Enabling Information
COBIT 5 For Assurance
COBIT 5 For Risk
COBIT 5 Online Collaborative Environment
COBIT 5 & RELATED PRODUCTS
COBIT 4.1 & RELATED PRODUCTS
Section: 01COBIT PRODUCTS
Robust Family of Products
The COBIT 5 product family includes the centerpiece framework and encompasses a comprehensive set of enabler and professional guides and resources that provide additional guidance on how professionals in all industries and geographies can use COBIT to deliver their products and services. Bring order to the growing complexity of IT.
Globally Endorsed & Validated
COBIT 5: A Flexible Framework
VAL IT AND RELATED PRODUCTS
RISK IT AND RELATED PRODUCTS
COBIT 5 signifies a transformation in the business view of the governance and management of enter-prise IT. It accelerates the alignment of organizational strategy and IT in a way that increases value, stimu-lates growth and creates distinct competitive advantages, all while fortifying against threats and risks.
A consolidated, comprehensive resource, COBIT 5 embodies global thought leadership and guidance, and is an asset that helps business, IT and governance experts around the world thrive.
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
6 72014 BOOKSTORE CATALOG
COBIT 5 COBIT 5
PROFESSIONAL GUIDES
COBIT 5 Implementation Information and related information technologies are pervasive in enterprises. It is no longer possible or good practice to separate business and IT-related activities. The governance and management of enterprise IT should be an integral part of enterprise governance, covering the each enterprise, end-to-end.
Member: US $35.00Nonmember: US $150.00Currently available in 4 languagesAvailable in print CB5IG and eBook WCB5IG
COBIT 5 for Information SecurityCOBIT 5 for Information Security examines COBIT 5 from a security view, placing a security lens over the concepts, enablers and principles. Using it can help enterprises benefit from improved risk decisions and cost management related to information security.
Member: US $35.00Nonmember: US $175.00Available in print CB5IS and eBook WCB5IS
COBIT 5 for Assurance Building on the COBIT 5 framework, this guide focuses on assurance and provides more detailed and practical guidance for assurance professionals and other interested parties at all levels of the enterprise on how to use COBIT 5 to support a variety of IT assurance activities.
Member: US $35.00Nonmember: US $175.00Available in print CB5A and eBook WCB5A
COBIT PRODUCTS
COBIT 5: A Business Framework for the Governance and Management of Enterprise IT This volume documents the five principles and seven supporting enablers that defines the COBIT 5 framework and incorporates the latest thinking in enterprise governance and management techniques.
Member: US $35.00Nonmember: US $50.00Currently available in 8 languagesA complimentary eBookAvailable in print CB5 and eBook WCB5
ENABLER GUIDES
COBIT 5: Enabling ProcessesThis publication contains a detailed reference guide to the processes defined in the COBIT 5 process reference model. COBIT 5: Enabling Processes includes the COBIT 5 Goals Cascade, a process mode explanation and the process reference model.
Member: US $35.00Nonmenber: US $135.00Currently available in 7 languagesAvailable in print CB5EP and eBook WCB5EP
COBIT 5: Enabling InformationA reference guide that provides a structured way of thinking about information governance and management issues in any type of organization. This structure can be applied throughout the life cycle of information, from conception through the time information is destroyed.
Member: US $35.00 Nonmember: US $135.00Available in print CB5EI and eBook WCB5EI
PROFESSIONAL GUIDES (Continued)
COBIT 5 for RiskEffectively managing IT risk helps drive better business performance by linking information and technology risk to the achievement of strategic enterprise objectives. This information risk view of COBIT 5 provides detailed guidance to help businesses leaders manage risk in their organization.
Member: US $35.00Nonmember: US $175.00Available in print CB5RK and eBook WCB5RK
COBIT ASSESSMENT PROGRAM
COBIT Process Assessment Model (PAM): Using COBIT 5 The Process Assessment Model (PAM) for COBIT 5 provides a repeatable and reliable way to assess IT process capabilities, which helps IT leaders gain C-level and board member buy-in for change and improvement initiatives.
Member: US $30.00Nonmember: US $50.00Available in print CPAM5 and eBook WCPAM5
COBIT Assessor Guide: Using COBIT 5Provide organizations with an understandable, logical, repeatable, reliable and robust methodology for assessing the capability of their IT processes. Assessments can then be used to report on the capability of the organizations IT processes or to establish a target for improvement based on business requirements.
Member: US $30.00Nonmember: US $80.00Available in print CAG5 and eBook WCAG5
COBIT Self-Assessment Guide: Using COBIT 5 Building on the COBIT 5 framework, this guide focuses on assurance and provides more detailed and practical guidance for assurance professionals and other interested parties at all levels of the enterprise on how to use COBIT 5 to support a variety of IT assurance activities.
Member: US $30.00Nonmember: US $50.00Available in print CSAG5 and eBook WCSAG5
COBIT 5 Special BulkDiscount Structure
5-9 copies .....................................................10%
10-19 copies .....................................................15%
20-39 copies .....................................................20%
40-69 copies .....................................................30%
70-99 copies .....................................................40%
100+ copies .....................................................50%
COBIT 5 Bundle Discount:Purchase the complete COBIT 5 Bundle and save!
The set includes:
COBIT 5 COBIT 5 Implementation COBIT 5: Enabling Processes
MEMBER PRICE: US $95.00NON-MEMBER PRICE: US $275.00
*COBIT 5 Special Bulk Discount does not apply to the COBIT 5 Bundle.
A Business Framework for the Governance and Management of Enterprise IT
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
8 92014 BOOKSTORE CATALOG
COBIT 5 COBIT 5
BUSINESS GOVERNANCE AND MANAGEMENT OF ENTERPRISE IT
Download a complimentary copy of COBIT 5 today or learn more at www.isaca.org/cobit
112
2 3
9.6 MILLION
US $1 TRILLION
AVERAGE COST
$5,000A MINUTE
EMAILS PER DAY
CYBERCRIME COSTS
PER YEAR
PETABYTES:business-related information
processed by the worlds computer servers per year
http://www.isaca.org/About-ISACA/Press-room/News-Releases/2011/Pages/ISACA-Survey-Bring-Your-Own-Device-Trend-Heightens-Online-Holiday-Shopping-Risk.aspxhttp://www.gsma.com/articles/gsma-announces-the-business-impact-of-connected-devices-could-be-worth-us-4-5-trillion-in-2020/22536
http://blogs.mcafee.com/mcafee-labs/mcafee-q4-threats-report-shows-malware-surpassed-75-million-samples-in-2011http://www.radicati.com/?p=6904
http://ucsdnews.ucsd.edu/newsrel/general/04-05BusinessInformation.asphttp://www.informationweek.com/thebrainyard/news/community_management_development/231602379http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html
http://www.mofo.com/privacy--data-security-services/http://www.time.com/time/world/article/0,8599,2108354,00.html
http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007/
THE AVERAGE CORPORATE WORKER SENDS & RECEIVES
1
3WORKERRECEIVES
TERABYTESof
INFORMATIONPER YEAR
6 OUT OF 10EMPLOYEESAGES 18-35USE A PERSONALDEVICE FOR WORK
CONNECTEDDEVICES
by
COMPANIES
RISK
2011
2020
MALWARESAMPLES
in
2012
SOCIALMEDIAINCIDENTS
SOURCES
from
are at
65PASS****
FOR DOWNTIME
$380B
24B
75M
COST OF DISASTERSin
EXTRACTING VALUE FROM
INFORMATION CHAOS
SECURITY BREACHES
DATA PROLIFERATION
DOWNTIME
BYOD [BRING YOUR OWN DEVICE]
SOCIAL MEDIA RISK
COUNTRIES HAVE THEIR OWN DATA
PROTECTIONLAWS
PRIVACY REGULATIONS
WHY GOOD GOVERNANCE MAKES GOOD SENSE
Securing Mobile Devices: Using COBIT 5 for Information SecurityThis publication is intended for several audiences who use mobile devises directly or indirectly. The publication applies COBIT 5 to mobile device security is to establish a uniform management framework and to give guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises.
Member: US $35.00Nonmember: US $75.00Available in print CB5SMD and eBook WCB5SMD
Transforming Cybersecurity: Using COBIT 5Cybersecurity has evolved as a new field of interest, gaining political and societal attention. Given this magnitude, the future tasks and responsibilities associated with cybersecurity will be essential to organizational survival and profitability. This publication applies the COBIT 5 framework and its component publications to transforming cybersecurity in a systemic way.
Member: US $35.00 Nonmember: US $60.00Available in print CB5TC and eBook WCB5TC
COBIT PRACTICAL GUIDANCE
Configuration Management: Using COBIT 5Enterprises continuously experience changes and without proper communication and coordination, signs of malfunction are likely to manifest as business disruptions, inefficiencies and potential financial losses. This publication provides detailed guidance to help enterprise leaders manage change and minimize unforeseen impacts.
Member: US $30.00Nonmember: US $55.00Available in print CB5CM and eBook WCB5CM
COBIT 5 Training Programs
ISACA offers a wide variety of COBIT training programs designed to fit your unique requirements for subject matter and learning style.
COBIT 5 Foundation Course & Exam COBIT 5 Implementation Course & Exam COBIT Certified Assessor Program COBIT Certified Assessor Course COBIT Certified Assessor Exam COBIT Certified Assessor Certification
Learn more at www.isaca.org/COBIT5
Vendor Management: Using COBIT 5This publication describes the vendor management process and its activities and then presents the most common threats, risk and mitigation actions. A detailed case study is provided to show the potential consequences of faulty vendor management. Practical sample templates and checklists are also.
Member: US $35.00Nonmember: US $60.00Available in print CB5VM and eBook WCB5VM
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
10 112014 BOOKSTORE CATALOG
COBIT 4.1 and Related ProductsCOBIT 5
COBIT 5
COBIT 5 builds and expands on COBIT 4.1 by integrating other major frameworks, standards and resources, including ISACAs Val IT and Risk IT, Information Technology Infrastructure Library (ITIL) and related standards from the International Organization for Standardization (ISO) and also draws significantly from the Business Model for Information Security (BMIS) and ITAF.
You are invited to download the COBIT 5 framework for no charge and if more guidance is needed, reference the individual publications for more detail.
Download here: www.isaca.org/COBIT
COBIT Focus
The COBIT Focus newsletter is complimentary to all COBIT users. Sign Up >
COBIT 5 Benefits Enterprises of all sizes:
Maintain high-quality information to support business decisions
Achieve strategic goals through the effective and innovative use of IT
Achieve operational excellence through reliable, efficient application of technology
Maintain IT-related risk at an acceptable level
Optimize the cost of IT services and technology
Support compliance with relevant laws, regulations, contractual agreements and policies
COBIT 5 consolidates and integrates the COBIT 4.1, Val IT 2.0 and Risk IT frameworks and also draws significantly from BMIS and ITAF. You are invited to review the COBIT 5 framework first at isaca.org/COBIT and if more guidance is needed, reference the individual publications for more detail.
Business BenefitsBeyond IT
In todays value-driven world, decisions cant be made in vacuums or silos. The comprehensive nature of business is reflected in the comprehensive nature of COBIT 5. Its globally accepted principles, practices, analytical tools and models are designed for business executives as well as , and enterprises of all sizes and in all industries can benefit. COBIT 5 addresses the needs of business and IT stakeholders across the enterprise and helps clarify goals for more effective decision making. COBIT 5 helps demonstrate that the right priorities are in place, the right decisions are being made and risk is being addressed. It allows enterprises to rely on established, credible practices, rather than reinvent the wheel. It was developed by strong international thought leaders, and will continue to evolve with advancements in the industry.
COBIT 4.1 ISACAMember US $75.00Nonmember US $190.00CB4.1
COBIT and Application Controls: A Management Guide ISACAPrint CACMember US $35.00Nonmember US $75.00eBook WCAC Nonmember US $55.00
COBIT Control Practices: Guidance to Achieve Control Objectives for Successful IT Governance, 2nd Edition ISACAMember US $55.00Nonmember US $110.00CPS2
COBIT Process Assessment Model (PAM): Using COBIT 4.1 ISACA Print CPAMMember US $30.00Nonmember US $50.00eBook WCPAM Nonmember US $40.00
COBIT Self-assessment Guide: Using COBIT 4.1 ISACA Print CSAGMember $25.00Nonmember $40.00eBook WCSAG Nonmember US $30.00
COBIT Quickstart, 2nd Edition ISACA Member US $55.00Nonmember US $110.00CBQ2
COBIT Assessor Guide: Using COBIT 4.1 ISACA Print CAGMember US $50.00Nonmember US $100.00eBook WCAG Member US $30.00Nonmember US $80.00
COBIT Security Baseline: An Information Security Survival Kit, 2nd EditionISACA Member US $20.00Nonmember US $40.00CBSB2
COBIT User Guide for Service ManagersISACA Print CUGMember US $20.00Nonmember US $50.00eBook WCUG Nonmember US $35.00
IT Assurance Guide: Using COBITISACA Member US $55.00Nonmember US $165.00CB4A
Implementing and Continually Improving IT GovernanceISACA Member US $55.00Nonmember US $115.00ITG9
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
12 132014 BOOKSTORE CATALOG
COBIT 4.1 and Related Products COBIT 4.1 and Related Products
IT is complicated.IT governance does not have to be.
For more information on COBIT 5 and its family of products, visit the ISACAwebsite at www.isaca.org/cobit.
Meycor ProductsCOBIT Suite Datasec
The Meycor COBIT Suite is a complete and integrated software for use in implementing COBIT 4.1 as a governance of IT, IT security or IT assurance tool. It includes five modules:
Meycor COBIT CSA (Control Self Assessment)
Meycor COBIT MG (Management & Governance)
Meycor COBIT AG (Assurance Guidelines)
Meycor COBIT KP (Knowledge Provider)
Meycor COBIT Delphos (Balanced Scorecard)
It also includes a central module that allows for the performance of administrative and functional tasks among different modules. All COBIT contents are unified in a single database shared by different modules.
Enterprise Value: Governance of IT Investments, Getting Started With Value Managemente-book VITM Member US $25.00Nonmember US $40.00
Enterprise Value: Governance of IT Investments,The Val IT Framework 2.0e-book VITF2 Member US $45.00Nonmember US $90.00
The Business Case Guide Using Val IT 2.0e-book VITB2 Member US $25.00Nonmember US $40.00
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring ResultsMichael D. S. Harris, David Herron and Stasia Iwanicki
39CR Member US $80.00Nonmember US $90.00
The Risk IT FrameworkRITFMember US $45.00Nonmember US $95.00
The Risk IT Practitioner GuideRITPGMember US $46.00Nonmember US $115.00
VAL IT AND RELATED PRODUCTS
RISK IT AND RELATED PRODUCTSVAL IT AND RELATED PRODUCTS (Continued)
SharePoint Deployment Governance Using COBIT 4.1: A Practical ApproachISACA Member US $30.00Nonmember US $70.00SDG
COBIT Suite DatasecISACA
Web Site Download EMSWMember US $9,849.00Nonmember US $10,970.00
COBIT CSA (Control Self-assessment) ISACA
Web Site Download ECSAWMember US $2,010.00Nonmember US $2,260.00
COBIT MG (Management Guidelines) ISACA
Web Site Download EMGW Member US $2,258.00Nonmember US $2,540.00
COBIT AG (Audit Guidelines) ISACA
Web Site Download EAGW Member US $2,258.00Nonmember US $2,540.00
COBIT KP (Knowledge Provider) ISACA
Web Site Download EKPW Member US $3,694.00Nonmember US $4,120.00
COBIT Delphos ISACA
Web Site Download EDWMember US $2,550.00 Nonmember US $2,860.00 Risk Management Approach to Business Continuity: Aligning Business
Continuity With Corporate GovernanceDavid Kaye and Julia Graham
5ROMember US $95.00Nonmember US $105.00
Enterprise Value: Governance of IT Investments Complete Set VITS2Member US $105.00Nonmember US $185.00
Value Management Guidance for Assurance Professionals: Using Val IT 2.0VITAGMember US $25.00Nonmember US $40.00eBook
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
14 152014 BOOKSTORE CATALOG
Exam References
CISA
CISM
CGEIT
CRISC
Section: 02EXAM REFERENCE
ISACA certifications are recognized globally as the industry standard and in many cases as job prerequisites for IT audit, assurance, control, governance, risk and security-related positions.
Enterprises worldwide are seeking forward-thinking thought leaders with the skill to anticipate problems and stay ahead of the curve. Having an ISACA certification announces you and your team are accomplished individuals with an innovative point of view and up to the task to help set the enterprise up for future success.
CISA PRODUCTS
CISA Review Manual 2014 A comprehensive reference guide designed to help individuals prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed IS audit, assurance, security and control resource available worldwide.
Member price: US $105.00 Nonmember price: US $135.00CRM14
Available in: Chinese Simplified, Japanese, Spanish, Italian, French
CISA Review Questions, Answers & Explanations Manual 2014 SupplementThis guide features 100 new sample questions, answers and explanations to help candidates effectively prepare for the CISA exam. The questions are intended to provide CISA candidates with an understanding of the type and structure of questions that have typically appeared on past exams.
Member price: US $40.00Nonmember price: US $60.00QAE14ES
Available in: Chinese Simplified, Japanese, Spanish, Italian, French
CISA Review Questions, Answers & Explanations Manual, 2013 Supplement This guide features 100 new sample questions, answers and explanations to help candidates effectively prepare for the CISA exam. The questions are intended to provide CISA candidates with an understanding of the type and structure of questions that have typically appeared on past exams.
Member price: US $40.00 Nonmember price: US $60.00 QAE13ESAvailable in: Chinese Simplified, Japanese, Spanish, Italian, French
CISA Practice Question Database v14A comprehensive 1,150-question study guide that combines the 950 questions and answers from the CISA Review Questions, Answers & Explanations Manual 2013 with those from the 2013 and 2014 editions of the CISA Review Questions, Answers & Explanations Manual Supplements(100 questions and answers each). Exam candidates can take sample exams with randomly selected questions, and view the results by job practice domain, allowing for concentrated study in particular areas. Additionally, questions generated during a study session are sorted based on previous scoring history, allowing CISA candidates to identify their strengths and weaknesses and focus their study efforts accordingly.
Member price: US $185.00 Nonmember price: US $225.00Available in CD-ROM CDB14 or Download CDB14W
Available in Spanish
CISA Review Questions, Answers & Explanations Manual 2013Designed to familiarize candidates with the question types and topics featured in the CISA exam, this guide consists of 950 multiple-choice study questions that have previously appeared in the CISA Review Questions, Answers & Explanations Manual 2011 and the 2011 and 2012 Supplements.
Member price: US $100.00 Nonmember price: US $130.00QAE14
Available in: Chinese Simplified, Japanese, Spanish, Italian
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
16 172014 BOOKSTORE CATALOG
Exam References Exam References
CISM PRODUCTS
CISM Review Manual 2014A comprehensive reference guide designed to help individuals prepare for the CISM exam and understand the roles and responsibilities of an information security manager. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed information security management resource available worldwide.
Member price: US $85.00 Nonmember price: US $115.00CM14
Available in Spanish
CISM Review Questions, Answers & Explanations Manual 2014 SupplementThis guide features 100 new sample questions, answers and explanations to help candidates effectively prepare for the CISM exam. The questions are intended to provide CISM candidates with an understanding of the type and structure of questions that have typically appeared on past exams.
Member price: US $40.00 Nonmember price: US $60.0014ES
Available in Spanish
CISM PRODUCTS (Continued)
CISM Review Questions, Answers & Explanations Manual 2014 The guide consists of 815 multiple-choice study questions, answers and explanations, which are organized according to the CISM job practice domains. The questions in this manual have been consolidated from the CISM Review Questions, Answers & Explanations Manual 2012 and the 2012 and 2013 editions of the CISM Review Questions, Answers & Explanations Manual Supplement.
Member price: US $70.00 Nonmember price: US $90.00CQA14
Available in Japanese, Spanish
CISM Practice Question Database v14A comprehensive 915-question study guide that combines the questions from the Review Questions, Answers & Explanations Manual 2014 with those from the 2014 supplement. Exam candidates can take sample exams with randomly selected questions, and view the results by job practice domain, allowing for concentrated study in particular areas. Additionally, questions generated during a study session are sorted based on previous scoring history, allowing CISM candidates to identify their strengths and weaknesses and focus their study efforts accordingly.
Member price: US $120.00 Nonmember price: US $160.00
Available in CD-ROM MDB14 or Download MDB14W
CGEIT PRODUCTS
CGEIT Review Manual 2014 The CGEIT Review manual is designed to help individuals prepare for the CGEIT exam and understand the responsibilities of those who implement or manage the governance of enterprise IT (GEIT) or have significant advisory or assurance responsibilities in regards to GEIT.
Member price: US $85.00 Nonmember price: US $115.00CGM14
CGEIT Review Questions, Answers & Explanations Manual 2013The CGEIT Review Questions, Answers & Explanations Manual 2013 is designed to familiarize candidates with the question types and topics featured in the CGEIT exam. The 60 questions in this manual have been consolidated from the CGEIT Review Questions, Answers & Explanations Manual 2011 and the CGEIT Review Questions, Answers & Explanations Manual 2012 Supplement.
Member price: US $40.00 Nonmember price: US $60.00CGQ13
CGEIT Review Questions, Answers & Explanations Manual 2013 SupplementThe CGEIT Review Questions, Answers & Explanations Manual 2013 Supplement features 60 new sample questions, answers and explanations to help candidates effectively prepare for the 2013 CGEIT exam. The questions are intended to provide CGEIT candidates with an understanding of the type and structure of questions that have typically appeared on past exams, and were prepared specifically for use in studying on the CGEIT exam.
Member price: US $40.00 Nonmember price: US $60.00CGQ13ES
CGEIT Review Questions, Answers & Explanations Manual 2014 SupplementThis manual features 60 new sample questions, answers and explanations to help candidates effectively prepare for the CGEIT exam. The questions are intended to provide CGEIT candidates with an understanding of the type and structure of questions that have typically appeared on past exams.
Member price: US $40.00 Nonmember price: US $60.00CGQ14ES
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
18 192014 BOOKSTORE CATALOG
Exam References Exam References
CRISC PRODUCTS
CRISC Review Manual 2014 The CRISCTM Review Manual 2014 is a comprehensive reference guide designed to help individuals prepare for the CRISC exam and understand IT-related business risk management roles and responsibilities. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed IT-related business risk management resource available worldwide.
Member price: US $85.00 Nonmember price: US $115.00CRR14
CRISC Review Questions, Answers & Explanations Manual 2014 SupplementThe CRISCTM Review Questions, Answers & Explanations Manual 2014 Supplement features of 100 new sample questions, answers and explanations to help candidates effectively prepare for the CRISC exam. The questions are intended to provide CRISC candidates with and understanding of the type and structure of questions that have typically appeared on past exams, and were prepared specifically for use in studying for the CRISC exam.
Member price: US $40.00 Nonmember price: US $60.00CRQ13ES
CRISC Review Questions, Answers & Explanations Manual 2013The publications is designed to familiarize candidates with the question types and topics featured in the CRISC exam. The 200 questions in this manual have been consolidated from the CRISCTM Review Questions, Answers & Explanations Manual 2011 and the CRISCTM Review Questions, Answers & Explanations Manual 2012 Supplement.
Member price: US $40.00 Nonmember price: US $60.00CRQ14
CRISC Review Questions, Answers & Explanations Manual 2013 SupplementThe CRISCTM Review Questions, Answers & Explanations Manual 2013 Supplement features of 100 new sample questions, answers and explanations to help candidates effectively prepare for the CRISC exam. The questions are intended to provide CRISC candidates with an understanding of the type and structure of questions that have typically appeared on past exams, and were prepared specifically for use in studying for the CRISC exam.
Member price: US $40.00 Nonmember price: US $60.00CRQ14ES
CRISC PRODUCTS (Continued)
CRISC Practice Question Database 12 Months
The CRISC Practice Question Database - 12 Month Subscription is a comprehensive 400-question pool of items that combine the questions from the CRISC Review Questions, Answers & Explanations Manual 2013 with those from the 2013 and 2014 editions of the CRISC Review Questions, Answers & Explanations Manual Supplement.
Member price: Nonmember price: XMXCR14-12M
CRISC Practice Question Database 6 Month Extension
CRISC Practice Question Database - 6 Month Extension should be purchased only as an extension to the CRISC Practice Question Database - 12-Month SubscriptionExam candidates can take sample exams with randomly selected questions and view the results by job practice domain, allowing for concentrated study in particular areas. Additionally questions generated during a study session are sorted based on previous scoring history, allowing CRISC candidates to identify their strengths and weaknesses and focus their study efforts accordingly. Other features provide the ability to select sample exams by specific job practice domain, view questions that were previously answered incorrectly and vary the length of study sessions, giving candidates the ability to customize their study approach to fit their needs.
Member price: US $45.00 Nonmember price: US $65.00XMXCR14-EXT180
US $185.00US $225.00
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
20 212014 BOOKSTORE CATALOG
Non-English Resources
SPANISH
CHINESE
FRENCH
ITALIAN
JAPANESE
ARABIC
GERMAN
HEBREW
LITHUANIAN
ROMANIAN
RUSSIAN
THAI
TURKISH
Section: 03NON-ENGLISH RESOURCES
ESPAOL
Manual de Preparacin al Examen CISA 2014El Manual de Preparacin al Examen CISA 2014 es una completa gua de referencia diseada para ayudar a quienes se preparan para el examen CISA, as como tambin para comprender los roles y las responsabilidades de un auditor de sistemas de informacin (SI). El manual ha sido mejorado y revisado por profesionales altamente calificados en las ltimas ediciones, por lo que representa el recurso disponible a nivel mundial ms actualizado y completo en auditora, aseguramiento, seguridad y control de sistemas de informacin (SI).
Precio miembro: US $105.00Precio no miembro: US $135.00CRM14S
Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2014El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2014 contiene 100 nuevas preguntas de ejemplo, respuestas y explicaciones, para ayudar a los candidatos a prepararse de forma efectiva el examen CISA. Estas nuevas preguntas estn diseadas para ser similares a las realmente empleadas en el examen. Las preguntas estn diseadas para ofrecer a los candidatos un entendimiento sobre el tipo y estructura de las preguntas que han aparecido habitualmente en exmenes anteriores, y han sido preparadas especficamente para su utilizacin en la preparacin del examen CISA.
Precio miembro: US $40.00Precio no miembro: US $60.00QAE14SS
Base de Datos de Preguntas de Prctica v14 CISALa Base de Datos de Preguntas de Prctica v14 CISA combina el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2013 con los Suplementos 2013 y 2014 del Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA (100 preguntas y respuestas cada uno) en un producto completo para estudio con 1150 preguntas. Los candidatos pueden tomar ejemplos de exmenes con preguntas seleccionadas al azar, y pueden ver los resultados por rea de prctica de trabajo, lo que permite que el candidato se concentre en un rea particular. Adems, las preguntas generadas durante una sesin de estudio estn clasificadas de acuerdo a la historia de calificaciones previas del usuario, lo que permite a los candidatos CISA identificar fcilmente sus puntos fuertes y dbiles y concentrar de esa manera su estudio de acuerdo a lo que necesiten.
Precio miembro: US $185.00Precio no miembro: US $225.00Disponible en CD-ROM CDB14S o en versin de descarga CDB14SW.
Information is todays currency. Yet the complexity of the business and technology environments continues to grow, with increasing legal and regulatory requirements, as well as more diverse and sophisticated security threats. As enterprises are faced with massive volumes of data, tightening privacy restrictions and a tangle of regulations, maximizing the value of an enterprises information and technology becomes a daily challenge. ISACA can help.
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
22 232014 BOOKSTORE CATALOG
Non-English Resources Non-English Resources
Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2013El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA Suplemento 2013 contiene 100 nuevas preguntas de ejemplo, respuestas y explicaciones, para ayudar a los candidatos a prepararse de forma efectiva el examen CISA. Estas nuevas preguntas estn diseadas para ser similares a las realmente empleadas en el examen. Las preguntas estn diseadas para ofrecer a los candidatos un entendimiento sobre el tipo y estructura de las preguntas que han aparecido habitualmente en exmenes anteriores, y han sido preparadas especficamente para su utilizacin en la preparacin del examen CISA.
Precio miembro: US $40.00Precio no miembro: US $60.00 QAE13SS
Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM Suplemento 2014El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM Suplemento 2014 consta de 100 nuevas preguntas de ejemplo, sus respuestas y explicaciones para ayudar a los candidatos a prepararse efectivamente para el examen CISM. Estas nuevas preguntas estn diseadas para ser similares a las de los exmenes reales. Se busca que las preguntas brinden a los candidatos a CISM la comprensin del tipo y estructura de las preguntas que tpicamente han aparecido en exmenes anteriores, y fueron especficamente preparadas para ser utilizadas en la preparacin para el examen CISM.
Precio miembro: US $40.00Precio no miembro: US $60.00 CQA14SS
ESPAOL (Continuado)
Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2013Diseado para familiarizar a los candidatos con los modelos de pregunta y temas encontrados en el examen CISA, el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2013 consta de 950 preguntas de estudio, de tipo seleccin mltiple, que aparecieron en el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA 2011 y los Suplementos 2011 y 2012 del Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISA. Muchas preguntas han sido revisadas o escritas completamente de nuevo para representar mejor el formato de las preguntas en el examen CISA y/o brindar aclaraciones o explicaciones adicionales sobre la respuesta correcta. Estas no son preguntas reales del examen; pero se espera que proporcionen al candidato a CISA una mayor comprensin del tipo y la estructura de las preguntas y los temas que han aparecido anteriormente en el examen.
Precio miembro: US $100.00Precio no miembro: US $130.00QAE13S
Manual de Preparacin al Examen CISM 2014El Manual de Preparacin al Examen CISM 2014 es una gua completa de referencia diseada para ayudar a quienes se preparan para el examen CISM, as como a quienes desean comprender los roles y las responsabilidades de un gerente de seguridad de la informacin. El manual ha sido continuamente mejorado durante las diez ediciones anteriores, siendo un recurso global sobre el gerenciamiento de la seguridad de la informacin actualizado, completo, y pre-revisado por pares altamente calificados.
Precio miembro: US $85.00Precio no miembro: US $115.00CM14S
ESPAOL (Continuado)
Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM Suplemento 2014El Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM 2014 consiste en 815 preguntas de estudio de mltiple eleccin, respuestas y explicaciones que estn organizadas segn las reas de prctica de trabajo de CISM. Las preguntas de este manual han sido recopiladas desde el Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM 2012 y los Suplementos 2012 y 2013 del Manual de Preguntas, Respuestas y Explicaciones de Preparacin al Examen CISM.
Precio miembro: US $70.00Precio no miembro: US $90.00 CQA14S
Controles estratgicos y operacionales de la TIJohn Kyriazogloul
Tome el control de sus sistemas informticos y obtenga las recompensas que le ofrece el negocio. Todos estamos familiarizados con los beneficios que la informtica proporciona a los negocios. Sin embargo, los sistemas informticos desestructurados o mal controlados pueden sembrar el caos, ocasionar resultados inesperados e incluso amenazar su negocio a travs de crmenes informticos y de violaciones de seguridad. Para llevar estos riesgos al mnimo, cualquier sistema informtico necesita una serie de controles que aseguren el mximo beneficio de la tecnologa al mismo tiempo que una reduccin de las amenazas potencial para la empresa.
Precio miembro: US $60.00 Precio no miembro: US $70.00 20ITCE
Principios de Auditoria y Control de Sistemas de Informacion (Segunda Edicion)Manuel Tupia Anticona
Esta publicacin rene las nuevas prcticas internacionalmente aceptadas para auditoria de sistemas y tecnologas de informacion informacin comunicaciones, con un lenguaje sencillo. Se detallan tanto los aspectos de gestin como los de carcter meramente tcnico basados en el cuerpo de conocimientos propuesto por ISACA internacional.
Precio miembro: US $50.00Precio no miembro: US $60.00 ITCA2
Computacin Forense: Descubriendo Los Rastros InformticosJeimy Cano
En aos recientes, se ha visto un incremento en el nmero de delitos informticos, que han impactado considerablemente a la sociedad, para realizar investigaciones sobre delitos relacionados con las TIC se utilizan las tcnicas de cmputo forense, con el objetivo de preserver y analizar adecuadamente la evidencia digital que est tambin ligado a los aspectos legales que deben considerarse para presenter adecuadamente los resultados de la investigacin de la evidencia digital.
Precio miembro: US $40.00 Precio no miembro: US $50.00 1AOCF
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
24 252014 BOOKSTORE CATALOG
Non-English Resources Non-English Resources
ESPAOL (Continuado)
COBIT 5 FrameworkCOBIT 5 es el marco general que engloba negocio y gestin para el gobierno y la gestin de las TI de la empresa. Este volumen documenta los 5 principios de COBIT 5 y define los 7 catalizadores de apoyo que forman el marco. COBIT 5 es el nico marco de negocio para el gobierno y la gestin de las TI de la empresa. Esta versin evolucionada contiene las ltimas ideas en tcnicas de gobierno y gestin empresarial y ofrece principios universalmente aceptados, herramientas de anlisis y modelos para que aumente la confianza en y el valor de los sistemas de informacin.
Precio miembro: US $35.00Precio no miembro: US $50.00Un libro electrnico gratuito CB5SS
COBIT 5 ImplementationCOBIT 5 Implementacin tambin est disponible como descarga PDF gratuita para miembros de ISACA. Esta gua y COBIT 5 reconocen que la informacin y las tecnologas de la informacin relacionadas son generalizadas en las empresas y que no es posible, ni es buena prctica separar las actividades empresariales de las relacionadas con TI. Por lo tanto, el gobierno y la gestin de las TI de la empresa deberan implementarse como parte ntegra del gobierno de la empresa, cubriendo de extremo a extremo las reas de responsabilidad empresariales y funcionales de TI.
Esta publicacin facilita un enfoque de buenas prcticas para implementar un gobierno TI de la empresa (GEIT, por sus siglas en ingls) basado en un ciclo de vida de mejora continua que debe disearse en funcin de las necesidades particulares de cada empresa.
Precio miembro: US $35.00Precio no miembro: US $150.00Un libro electrnico gratuito CB5IGS
2013 CISA (CISA Review Questions, Answers & Explanations Manual 2013) CISA 950 2011 CISA CISA (2011 and 2012 Supplements) 2011 2012CISA
100 130 QAE13C
2013 CISA (CISA Review Questions, Answers & Explanations Manual 2013 Supplement) 100 2014CISA CISA CISA
40 60 QAE13CS
CHINESE
2014 CISA (CISA Review Manual 2014) CISA (IS)
105 135 CRM14C
2014 CISA (CISA Review Questions, Answers & Explanations Manual 2014 Supplement) 100 2014CISA CISA CISA
40 60 QAE14CS
COBIT 5: Enabling ProcessesCOBIT 5: Procesos Catalizadores tambin est disponible como descarga PDF gratuita para miembros de ISACA. Esta publicacin complementa a COBIT 5 y contiene una gua de referencia detallada de los procesos que estn definidos en el modelo de procesos de referencia de COBIT 5. COBIT 5: Procesos Catalizadores incluye La Cascada de Metas de COBIT 5, El Modelo de Procesos de COBIT 5 y El Modelo de Referencia de Procesos.
Precio miembro: US $35.00 Precio no miembro: US $135.00Un libro electrnico gratuito CB5EPS
COBIT 5 For Information SecurityCOBIT 5 para Seguridad de la Informacin es una Gua Profesional de COBIT 5. Examina COBIT 5 desde el punto de vista de la seguridad, mirando con un prisma de seguridad a los conceptos, catalizadores y principios de COBIT 5. El apndice B, Gua Detallada: Catalizador de Procesos se presenta en el mismo formato que las tablas de COBIT 5: Procesos Catalizadores y proporciona objetivos y mtricas de procesos, entradas/salidas y actividades, especficos para seguridad. COBIT 5 para Seguridad de la Informacin est destinado a todas las partes interesadas de la empresa, porque la seguridad de la informacin es responsabilidad de todas las partes interesadas de la empresa. Usarlo puede suponer beneficios para la empresa como mejores decisiones sobre riesgos y gestin de gastos relacionados con la funcin de seguridad de la informacin.
Precio miembro: US $35.00 Precio no miembro: US $175.00Un libro electrnico gratuito
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
26 272014 BOOKSTORE CATALOG
Non-English Resources Non-English Resources
COBIT 5 ImplementationCOBIT 5 PDF ISACA COBT 5 IT IT IT IT
35 150 CB5IGC
FRANAIS
Manuel de Prparation CISA 2014Le Manuel de Prparation CISA 2014 est un guide de rfrence exhaustif destin aider les candidats se prparer lexamen CISA et comprendre les rles et les responsabilits dun auditeur informatique. Le Manuel a t amlior par rapport aux ditions antrieures. Rvis par des pairs, il reprsente la ressource en audit, assurance, scurit et contrle des systmes dinformation la plus jour et la plus complte disponible travers le monde.
Prix membres : 105.00 $ USPrix non-membres : 135.00 $ USCRM14F
Manuel Complmentaire CISA 2014: Questions, Rponses et ExplicationsLe Manuel Complmentaire CISA 2014: Questions, Rponses et Explications contient 100 nouvelles questions, leurs rponses et des explications pour aider les candidats prparer efficacement lexamen CISA. Ces nouvelles questions sont conues lidentique des questions dun examen rel. Les questions visent donner au candidat lexamen CISA une bonne comprhension des structures et des types de questions qui ont t poses lors des examens prcdents. Ces questions ont t ralises spcialement pour la prparation lexamen CISA.
Prix membres : 40.00 $ USPrix non-membres : 60.00 $ USQAE14FS
Manuel Complmentaire CISA 2013: Questions, Rponses et ExplicationsLe Manuel Complmentaire CISA 2013 : Questions, Rponses et Explications contient 100 nouvelles questions, leurs rponses et des explications pour aider les candidats prparer efficacement lexamen CISA. Ces nouvelles questions sont conues lidentique des questions dun examen rel. Les questions visent donner au candidat lexamen CISA une bonne comprhension des structures et des types de questions qui ont t poses lors des examens prcdents. Ces questions ont t ralises spcialement pour la prparation lexamen CISA.
Prix membres : 40.00 $ USPrix non-membres : 60.00 $ USQAE13FS
CHINESE (Continued)
COBIT 5 FrameworkCOBIT 5IT COBIT 5IT
100 130 CB5C
COBIT 5: Enabling ProcessesCOBIT 5 PDF ISACA COBIT 5 COBIT 5 COBIT 5
35 135 CB5EPC
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
28 292014 BOOKSTORE CATALOG
Non-English Resources Non-English Resources
Manuale di Esercitazione CISA 2013: Domande, Risposte e SpiegazioniConcepito per familiarizzare il candidato con il tipo di domande e gli argomenti dellesame CISA, il Manuale di esercitazione CISA 2013: Domande, Risposte e Spiegazioni consiste di 950 domande a scelta multipla, tratte dal Manuale di esercitazione CISA 2011: Domande, Risposte e Spiegazioni e dai Supplementi 2011 e 2012. Molte domande sono state riadattate o totalmente riformulate per adeguarsi meglio al formato corrente delle domande desame CISA e/o a scopo di maggior chiarezza o migliore spiegazione della risposta esatta. Queste domande possono essere o no analoghe a quelle che compaiono allesame vero e proprio e sono fornite al candidato CISA per agevolare la comprensione del tipo e della struttura di domande e contenuti che sono precedentemente apparsi nellesame.
Prezzo socio: $ USA 100.00 Prezzo non socio: $ USA 130.00QAE13I
Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2013Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2013 contiene 100 nuove domande esemplificative, con risposte e spiegazioni per aiutare i candidati a prepararsi con efficacia allesame CISA. Queste nuove domande sono presentate in modo da costituire una simulazione desame. Le domande hanno lo scopo di consentire al candidato di capire il tipo e la struttura delle domande presenti negli esami precedenti e sono state formulate specificatamente per essere utilizzate nella preparazione allesame CISA.
Prezzo socio: $ USA 40.00 Prezzo non socio: $ USA 60.00QAE13IS
ITALIAN (Continued)
IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud (Italian)Il cloud computing un importante tema emergente nel mondo economico di oggi. Come seguito al documento pubblicato nellottobre 2009, ISACA ha realizzato questa edizione per approfondire lassurance del cloud computing. Lattenzione si concentra sui controlli e sulle contromisure da utilizzare nel cloud, ma esamina anche come adottare il cloud per creare valore nei sistemi aziendali. Il libro illustra questa soluzione e la sua importanza per le imprese, i rischi e la necessit di unattivit di assurance facilitata da COBIT.
Prezzo membro: GRATIS Non membri Prezzo: US $50.00WITCOCI
ITALIAN
Manuale Tecnico CISA 2014 Manuale Tecnico CISA 2014 una guida di riferimento completa concepita per aiutare i candidati nella preparazione dellesame CISA e nella comprensione dei ruoli e delle responsabilit di un auditor informatico. Il manuale stato migliorato rispetto alle passate edizioni e rappresenta oggi la fonte di riferimento pi attuale, esaustiva e autorevole a livello mondiale nel campo dellIT audit e della gestione della sicurezza delle informazioni.
Prezzo socio: $ USA 105.00 Prezzo non socio: $ USA 135.00CRM14I
Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2014 Manuale di Esercitazione CISA: Domande, Risposte e Spiegazioni Supplemento 2014 contiene 100 nuove domande esemplificative, con risposte e spiegazioni per aiutare i candidati a prepararsi con efficacia allesame CISA. Queste nuove domande sono presentate in modo da costituire una simulazione desame. Le domande hanno lo scopo di consentire al candidato di capire il tipo e la struttura delle domande presenti negli esami precedenti e sono state formulate specificatamente per essere utilizzate nella preparazione allesame CISA.
Prezzo socio: $ USA 40.00 Prezzo non socio: $ USA 60.00QAE14IS
JAPANESE
2014 (CISA2014(CISA) CISACISAIS
: US $105.00 : US $135.00CRM14J
2013CISA& 2013CISA CISA9502011CISA20112012CISA()2011CISACISACISA2014CISA2013CISA2014CISA
: US $100.00 : US $130.00QAE13J
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
30 312014 BOOKSTORE CATALOG
Non-English Resources Non-English Resources
JAPANESE(Continued)
2014CISA2014CISA& (CISA100CISA2014CISA 2013CISA
: US $40.00 : US $60.00 QAE14JS
2013CISA&)2013CISA) CISA100CISA2014CISA2013CISA
: US $40.00 : US $60.00 QAE13JS
2012 (CISM) 2012CISMCISM10
: US $85.00 : US $115.00 CM12J
JAPANESE(Continued)
COBIT 5: Enabling ProcessesCOBIT 5: Enabling ProcessISACAPDFCOBIT 5COBIT 5 COBIT 5
35.00 US135.00 USCB5EPG
COBIT 5 ImplementationCOBIT 5: ImplementationISACAPDF COBIT 5 ITITIT (GEIT)
35.00 US150.00 USCB3IGJ
COBIT 5 FrameworkCOBIT 5ITCOBIT 57 COBIT 5IT
: US $35.00 : US $50.00CB5J
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
32 332014 BOOKSTORE CATALOG
Non-English Resources Non-English Resources
HEBREW
COBIT 5 COBIT 5 . COBIT 5 .
, , / . COBIT , -21. COBIT 5 , , , , .
: US $40.00 : US $60.00 CB5H
LITHUANIAN
COBIT 5 FrameworkCOBIT 5 yra visa apimanti veiklos valdymo metodika, skirta organizacijos IT valdymui ir vadovavimui. ioje knygoje pateikiami 5 COBIT 5 principai ir apraomos metodikos pagrind sudaranios 7 realizavimo priemons. COBIT 5 yra vienintel veiklos valdymo metodika, skirta organizacijos IT valdymui ir vadovavimui. i evoliucin versija pateikia naujausi poir organizacijos IT valdymo ir vadovavimo metodus, naudodama visame pasaulyje pripaintus principus, analitines priemones ir modelius, leidianius labiau pasitikti informacinmis sistemomis ir gauti i j didesn vert.
Member price: US $35.00 Nonmember price: US $50.00Nemokamai ebookCB5L
ARABIC
COBIT 5 Framework 5 . .
. . ()
: US $35.00 : US $50.00 CB5AR
GERMAN
COBIT 5 FrameworkCOBIT 5 ist das bergreifende Business- und Management-Rahmenwerk fr die Governance und das Management der Unternehmens-IT. Dieser Band dokumentiert die fnf Grundstze von COBIT 5 und definiert 7 untersttzende Enabler, die das Rahmenwerk bilden. COBIT 5 ist das einzige Business-Rahmenwerk fr die Governance und das Management der Unternehmens-IT. Diese weiterentwickelte Version enthlt die neusten Entwicklungen auf dem Gebiet der Unternehmens-Governance und den Managementtechniken, und stellt allgemein akzeptierte Grundstze, analytische Werkzeuge und Modelle zur Verfgung, um zu helfen, das Vertrauen in und Wert von Informationssystemen zu vergrern.
Mitgliederpreis: 35,00 USD. Preis fr Nicht-Mitglieder: 50,00 USD.Ein kostenloses E-BookCB5G
COBIT 5: Enabling ProcessesBitte beachten Sie, dass COBIT 5: Enabling Processes fr ISACA-Mitglieder auch als kostenloser PDF-Download zur Verfgung steht. Diese Publikation ergnzt COBIT 5 und enthlt einen detaillierten Referenz-Leitfaden zu den Prozessen, die im COBIT 5 Prozessreferenzmodell definiert werden. Sie enthlt die COBIT 5 Ziel-Kaskade, das Prozessmodell und Prozessreferenzmodell. C13
Member Price: US $35.00 Nonmember Price: US $135.00Ein kostenloses E-BookCB5EPG
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
34 352014 BOOKSTORE CATALOG
Non-English Resources Non-English Resources
ROMANIAN
COBIT 5 FrameworkCOBIT 5 este cadrul de referin general pentru guvernarea i managementul IT din cadrul organizaiilor. Acest volum documenteaz cele cinci principii ale COBIT 5 i definete 7 catalizatori suport care alctuiesc cadrul de referin. COBIT 5 este singurul cadru de referin adresabil afacerilor pentru guvernarea i managementul IT n cadrul organizaiilor. Aceast versiune evolutiv ncorporeaz cele mai recente opinii cu privire la tehnicile de guvernare i management i ofer principii acceptate la nivel mondial, instrumente analitice i modele care ajut la creterea ncrederii n, i valoarea rezultat din sistemele informaionale.
Pre pentru membri: US 35.00 Pre pentru nonmembri: US 50.00Un eBook gratuitCB5R
COBIT 5: Enabling Processes V rugm s reinei c manualul COBIT 5: Procese catalizatoare este de asemenea disponibil ca fiier pdf, descrcabil gratuit de ctre membrii ISACA. Aceast publicaie completeaz COBIT 5 i conine un ghid detaliat al proceselor definite n modelul de referin al proceselor din COBIT 5. Manualul include de asemenea i succesiunea obiectivelor COBIT 5 i modelul de referin al proceselor.
Pre pentru membri: US 35.00 Pre pentru nonmembri: US 135.00Un eBook gratuitCB5EPR
RUSSIAN
COBIT 5 FrameworkCOBIT 5 - . COBIT 5 , . COBIT 5 , . , , , , , .
: US $ 35.00, : US $ 50.00. CB5RU
THAI
COBIT 5 Framework COBIT 5 5 COBIT 5 7
/ COBIT 21 COBIT 5
: US $35.00 : US $50.00eBook CB5TH
TURKISH
COBIT 5: Enabling ProcessesCOBIT 5: Gerekletirme Sreleri ISACA yelerine cretsiz olarak pdf formatnda www.isaca.org sitesinden sunulmaktadr. COBIT 5: Gerekletirme Sreleri, COBIT 5in iinde tanmlanan sre referans modelinin detaylarn, hedef basamaklarn ve olgunluk modelini tanmlamaktadr.
ISACA yelerine: US $35.00 dur ve ye olmayanlara US : US $135.00 cretsiz kitapCB5EPT
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
36 372014 BOOKSTORE CATALOG
RISK Related
RISK RELATED
In business today, strong support from IS/IT is an indispensable component of any company, and can be what separates good companies from great ones. Business leaders know that its not technology per se but the ability to use it wisely that counts. Helping businesses make that transition requires more than just problem solvers. ISACA invests in research that grows knowledge and results in the development of innovative thinking that security professionals can leverage in their everyday functions and strategies for the future.
Information Technology Risk Management in Enterprise EnvironmentsJake Kouns and Daniel Minoli
This book provides a comprehensive review of industry approaches, practices and standards on how to handle the ever-increasing risks to organizations business-critical assets. Through a practical approach, this book explores key topics that enable readers to uncover and remediate potential infractions.
Member: US $104.00Nonmember: US $114.00 84WRM
Advanced Persistent Threats: How to Manage the Risk to Your Business ISACA
An APT to the organization and practical measures that can be taken to prevent, detect and respond to such an attack. In addition, it highlights key differences between the controls needed to counter the risk of an APT attack and those commonly used to mitigate everyday information security risk.
Member: US $35.00 Nonmember: US $60.00Available in print APT and eBook WAPT formats
The Failure of Risk Management: Why Its Broken and How to Fix ItDouglas W. Hubbard
An essential guide to the calibrated risk analysis approach, this book takes a close look at misused and misapplied basic analysis methods. Using examples from the credit crisis, natural disasters, outsourcing, engineering disasters and more, the author reveals critical flaws in risk management methods and how these problems can be fixed.
Member: US $50.00Nonmember: US $60.00 78WRM
How to Complete a Risk Assessment in 5 Days or Less Thomas R. Peltier
This is what risk assessment is all about. This book demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation, this book includes user-friendly checklists, forms, questionnaires and sample assessments.
Member: US $92.00Nonmember: US $102.00 11CRC8
Section: 04
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
38 392014 BOOKSTORE CATALOG
RISK Related RISK Related
IT Risk: Turning Business Threats Into Competitive AdvantageGeorge Westerman and Richard Hunter
Based on research conducted by the Massachusetts Institute of Technology (MIT)s Center for Information Systems Research and Gartner Inc., this book helps enterprises focus on the most pressing risks and leverage the upside that comes with vigilance. Traditionally, managers have grouped technology risk and funding into silos. IT Risk outlines a new model for integrated risk management, which identifies three core areas that can be developed to eliminate the problems that silo strategies create.
Member: US $35.00Nonmember: US $45.002HBS
The Operational Risk Handbook for Financial CompaniesBrian Barnier
Range of proven operational risk techniques from other industries and disciplines to the troubled territory of financial services. The author introduces a range of sophisticated, dependable andcruciallyapproachable tools for risk evaluation, risk response and risk governance. He provides a more robust way of gaining a better picture of risks, shows how to build risk-return awareness into decision making, and explores how to fix (and not just report) risk.
Member: US $53.00Nonmember: US $63.001HOP
1001010101010101010101010101010101010101010101010101
100101010101010101010101010
0101010101010101010101
1001010101010101010101010101010101010101010101010101
1001010101010101010101010101010101010101010101010101
1001010101010101010101010101010101010101010101010101
10010101010101
1010101010101010101010101010101010101
10101010101010101010101010101010101010101010101010
10101010101010101010101
1
10101010101010
10101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101
10101010101010101010101010101010
1001010101010101010101010101010101010101010101010101
100101010101010101010101
1
0101010101010101
1001010101010101010101010101010101010101010101010101
1001010101010101010101010101010101010101010101010101
1001010101010101010101010101010101010101010101010101
1001010101010101010
01010101010101
101010101010101
101010101010101010101010101010101
010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101
1010101010101010
10101010101010101010101010101010101010101010101010
100101010101010101010101010101010101010
010101010
1001010101010101010101010101010101010101010101010
1001010101010101010101010101010101010101010101010
1001010101010101010101010101010101010101010101010
100101010101010
10101010101010
1001010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010
101010101010101
0101010101010101010101010
10101010101010101010101010101010101010101010101010
100101010101010
0
101010101010101010
100101010101010101010101010101010101010101010101010
100101010101010101010101010101010101010101010101010
100101010101010101010101010101010101010101010101010
10010101010101
1010101010101010101010101010
1010101010101010
010
0101010101010101
1010101010101010101010101010101010101010101010101
1010101010101010101010101010101010101010101010101
1010101010101010101010101010101010101010101010101
1010101010101
01010101010101010101010101
1001010101010101
10
1010101010101010
1001010101010101010101010101010101010101010101010
1001010101010101010101010101010101010101010101010
1001010101010101010101010101010101010101010101010
100101010101
01010101010101010101010101010101010
The Economic Impact of Cyber Crime and Cyber Espionage, Center for Strategic and International Studies, July 2013. 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013. 2012 IBM Global Reputational Risk and IT Study. The Risk of Insider Fraud, Ponemon Institute, February 2013. Pulse of the Profession, IIA, 2013. 2013 Internal Audit Capabilities and Needs Survey Report, Protiviti. Global Risk Management Survey 2013, Aon Risk Solutions. 2013 Pulse of the Profession, Project Management Institute, March 2013. COBIT 5 for Risk, ISACA, 2013.
SOURCES:
THE IT RISK EFFECT Failing to include technology risk in enterprise risk can have major impact
62%FORTUNE 500
CHIEF AUDIT EXECUTIVES with no plans to increase
focus on IT
45% Auditors with
NO PLANS TO INCLUDE SOCIAL MEDIA RISK
in audits
46% C-LEVEL EXECUTIVES who say that customer
satisfaction is very much affected by
IT risk
$135 MILLION
Amount at risk for every $1 billion that
companies spend1+
PER WEEKAverage number of
EMPLOYEE-RELATED FRAUD incidents in past
12 months
$100 BILLION
Annual losses due to cybercrime
$157 PER RECORD
Cost when data breach caused by hacker or other
cybercriminal
#6 Ranking of FAILURE
TO INNOVATE on Top 10 Global
Risk list
20 RISK SCENARIO
categories addressed in COBIT 5 for Risk
ISACA Published White Papers
ISACA has issued white papers to provide constituents with practical and pragmatic information that is timely and relevant regarding issues that impact enterprise operations.
Each white paper is provided as a complimentary PDF download, and a link for your feedback is provided on each white paper landing page. Your feedback is a very important element in the process of the development of ISACA guidance for our constituents.
Please visit www.isaca.org/whitepapers to download and comment on these valuable resources.
Advanced Persistent Threat Awareness Study Results
Big Data: Impacts and Benefits
Business Continuity Management: Emerging Trends
Calculating Cloud ROI: From the Customer Perspective
Cloud Computing Market Maturity Study Results
Cloud Governance: Questions Boards of Directors Need to Ask
Generating Value From Big Data Analytics
Guiding Principles for Cloud Computing Adoption and Use
Incident Management and Response
Privacy and Big Data Aug
Security As A Service
Security Considerations for Cloud Computing
Virtualization Desktop Infrastructure (VDI)
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
402014 BOOKSTORE CATALOG
ESSENTIALS
SPECIFIC ENVIRONMENTS
Section: 05AUDIT, CONTROL, SECURITY
ISACAs diverse library of audit/assurance programs includes a wide range of topics focused on a boundless mix of interests, talents and experiences. ISACA Audit/Assurance programs provide a globally tested approach for balancing risk, value and the use of resources. It helps leaders deliver on their business strategy through effective information and technology execution.
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
42 432014 BOOKSTORE CATALOG
Audit, Control, Security Audit, Control, Security
Essentials
The Definitive Guide to the C&A TransformationDavid Coderre
The first comprehensive manual that sets out to explain current standards and best practices. This book provides all the information needed to recognize, implement and manage the relevant authorization requirements, and, therefore, to achieve compliance with federal, local and agency laws and policies.
Member: US $70.00Nonmember: US $80.00 13ITCAT
The Essential Guide to Internal Auditing, 2nd EditionK. H. Spencer Pickett
This guide is essential for internal auditors. Learn the audit context and how it fits into the wider corporate agenda. This edition is set firmly within the corporate governance, risk management and internal control arena. It includes expanded coverage of risk management and is updated throughout to reflect the new Institute of Internal Auditors (IIA) standards and current practice advisories. It also includes many helpful models, practical guidance and checklists.
Member: US $55.00Nonmember: US $65.00 92WIA
ESSENTIALS (Continued)
Data Protection: Governance, Risk Management, and ComplianceDavid G. Hill
Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection.
Member: US $80.00Nonmember: US $90.00 51CRC
Effective Project Management: Traditional, Agile, Extreme, 6th EditionRobert K. Wysocki
Many projects fail to deliver on time and within budget, and often poor project management is to blame. The newest edition of this expert and top-selling book helps project managers avoid the pitfalls and manage projects successfully. Covering the major project management techniques including traditional (linear and incremental), agile (iterative and adaptive) and extreme, this book lays out a comprehensive overview of all of the best-of-breed project management approaches and tools today.
Member: US $60.00Nonmember: US $70.00 50WPM6
Build Your Own Security Lab: A Field Guide for Network TestingMichael Gregg
Those whose job is to design or implement IT security solutions, or who are studying for any security certification, will benefit from this how-to guide. This publication teaches readers how to assess needs, gather the tools and create a controlled environment in which to experiment, test and develop solutions that work. With liberal examples from real-world scenarios, it tells the reader how to implement a strategy to secure systems
Member: US $50.00Nonmember: US $60.00 76WSL
Building an Effective Information Security Policy ArchitectureSandy Bacik
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. For these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. This guide for security professionals explains how to review, develop and implement a security architecture for any size enterprise, whether it is a global company or a server message block.
Member: US $88.00Nonmember: US $98.00 43CRC
ESSENTIALS
Access Control, Security, and Trust: A Logical ApproachShiu-Kai Chin and Susan Beth Older
This book equips readers with an access control logic that they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.
Member: US $100.00Nonmember: US $110.00 48CRC
Accounting Information Systems, 9th EditionUlric J. Gelinas, Richard B. Dull and Patrick Wheeler
Todays accounting professionals are challenged to identify enterprise risks and provide quality assurance for a companys information systems focuses on critical accounting information systems in use today and controls for maintaining these systems.
Member: US $261.00Nonmember: US $271.00 1IT9
Auditing and Assurance Services: Understanding the Integrated AuditKaren L. Hooks
This publication discusses the auditing professions requirement to focus on the integrated audit in the wake of the Sarbanes-Oxley Act. It also outlines the impact of the Public Company Accounting and Oversight Board (PCAOB) on the auditing of public companies.
Member: US $237.00Nonmember: US $247.00 93WAAS
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
44 452014 BOOKSTORE CATALOG
Audit, Control, Security Audit, Control, Security
IT Auditing Using Controls to Protect Information Assets, 2nd EditionChris Davis, Mike Schiller and Kevin Wheeler
Filled with solid techniques, checklists, forms, coverage of leading-edge tools and systematic procedures for common IT audits, IT Auditing, 2nd Edition covers real-life scenarios and fosters the skills necessary for auditing complex IT systems. Fully updated to cover new technology including cloud computing, virtualization and storage, the book provides guidance on creating an effective and value-added internal IT audit function. Information is presented in easy-to-follow sections, allowing you to quickly grasp critical and practical techniques.
Member: US $70.00Nonmember: US $80.00 15MIT2
ESSENTIALS (Continued)
Essentials of Corporate FraudTracy Coenen
Full of valuable tips, techniques, illustrative real-world examples, exhibits and best practices, this handy and concise paperback will help you stay up to date on the thinking, strategies, developments and technologies in corporate fraud. Essentials of Corporate Fraud challenges the readers concept of corporate fraud, providing an introductory look at fraud and the kinds of fraud that can occur in various areas of a company.
Member: US $48.00Nonmember: US $58.00 71WCF
Fraud Analysis Techniques Using ACLDavid Coderre
Fraud Analysis Techniques Using ACL offers auditors & investigators: Authoritative guidance on the use of computer-
assisted audit tools and techniques in fraud detection A CD-ROM containing an educational version of ACL An accompanying CD-ROM containing a thorough
fraud tool kit with two sets of customizable scripts to serve your specific audit needs
Case studies and sample data files that you can use to try out the tests
Step-by-step instructions on how to run the tests A self-study course on ACL script development with exercises, data files and suggested answers.
Member: US $211.00Nonmember: US $221.00 82WCL
Essentials
Information Security and Privacy: A Practical Guide for Global Executives, Lawyers and TechnologistsThomas J. Shaw Esq. (Editor)
Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involved in information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country in which they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools needed to handle the business, legal and technical risk of protecting information on a global scale.
Member: US $120.00Nonmember: US $130.00 2ABA
Information Technology Control and Audit, 4th EditionSandra Senft and Frederick Gallegos
The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trends and defines recent advances in technology that impact IT controls and auditsincluding cloud computing, web-based applications, and server virtualization.
Member: US $90.00Nonmember: US $100.00 4CRC4
ESSENTIALS (Continued)
Interpretation and Application of International Standards on AuditingSteven Collings
In recent years, auditing has undergone significant changes, due in large part to well-publicized corporate disasters such as Enron and Parmalat, which have shaken the profession. In response, many countries have replaced preexisting domestic standards with International Standards on Auditing (ISAs) in an attempt to ensure that auditors throughout the world apply the same level of work during all audit assignments, and that audit quality remains consistent on a global basis.
Member: US $110.00Nonmember: US $120.00 95WISA
IT Audit, Control, and SecurityRobert Moeller
When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control and security, the book describes the types of internal controls, security and integrity procedures that management must build into its automated systems. This timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
Member: US $90.00Nonmember: US $100.00 90WACS
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
46 472014 BOOKSTORE CATALOG
Audit, Control, Security Audit, Control, Security
ESSENTIALS (Continued)
IT Control Objectives for Basel II: The Importance of Governance and Risk Management for ComplianceISACA
IT Control Objectives for Basel II provides a framework for managing operational and information risk in the context of Basel II. It presents an outline of risk under Basel II, links between operational risk and IT risk, and an approach for managing information risk. This publication addresses three groupsinformation risk managers, IT practitioners and financial services experts. The executive summary states that financial services organizations using the framework presented are able to apply recognized IT control objectives and management processes to address the role of IT in operational risk.
Member: US $20.00Nonmember: US $50.00Available in print ITCOB and eBook WITCOB
IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud ISACA
Cloud computing has become an important emergent issue in business today. As a follow-up to the white paper it issued in October 2009, ISACA has produced this book to examine assurance in the cloud.
The book focuses on controls and countermeasures that can be used in the cloud, and closely examines how to use the cloud to create value in systems. The book details the issue, why it is important to business, risks, why assurance is critical and how COBIT can help.
The book contains an audit program in the appendix, which is also available as a Word document.
Member: US $35.00Nonmember: US $60.00Available in print ITCOC and eBook WITCOC
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data Lance HaydenLance Hayden
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies.
Member: US $50.00Nonmember: US $60.00 22MSM
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
-
48
Audit, Control, Security
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
492014 BOOKSTORE CATALOG
Audit, Control, Security
ESSENTIALS (Continued)
IT Strategic and Operational ControlsJohn Kyriazoglou
Nowadays, integrated information systems can significantly magnify the accrued benefits of a given project and greatly strengthen an organization, but such benefits are balanced by a serious risk. If IT systems are not used in a disciplined manner, they can create havoc and frequently bring about unexpected results and catastrophe, as shown by the rise in security incidents and computer-based crimes.
This book is an ideal tool for those without specialized technical expertise who are seeking to understand IT controls and their design, implementation, monitoring, review and audit issues.
Member: US $60.00Nonmember: US $70.00 6ITSOC
A New Auditors Guide to Planning, Performing, and Presenting IT AuditsNelson Gibbs, Divakar Jain, Amitesh Joshi, Surekha Muddamsetti and Sarabjot Singh
Information technology is a highly dynamic, rapidly changing environment. IT auditors are expected to stay current with the latest tools, technologies and trends, and may need to do additional research to prepare for specific audits. This book is designed to help aspiring and active internal auditors take a step back and understand the general processes and activities involved in conducting an audit around technology.
Member: US $70.00Nonmember: US $80.00 1IIA
PCI Compliance, 3rd Edition Understand and Implement Effective PCI Data Security Standard ComplianceAnton Chuvakin and Branden R. Williams
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.
Member: US $60.00Nonmember: US $70.00 7SYN10
SAP Security and Risk Management, 2nd EditionMario Linkies and Horst Karin
The revised and expanded second edition of this best-selling book describes all requirements, basic principles and best practices of security for an SAP system. Readers learn how to protect each SAP component internally and externally while also complying with legal requirements. Furthermore, the book describes how to master the interaction of these requirements to provide a holistic security and risk management solution. Using numerous examples and step-by-step instructions, this book teaches the reader the technical details of implementing security in SAP NetWeaver.
Member: US $70.00Nonmember: US $80.00 2SAPP
ESSENTIALS (Continued)
Security Metrics: A Beginners GuideCaroline Wong
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of the enterprise. Security Metrics: A Beginners Guide explains, step by step, how to develop and implement a successful security metrics program.
Member: US $40.00Nonmember: US $50.00 28MSM
SOC 2: A User GuideISACA
SOC 2 is a Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy. This guide is intended for those evaluating a service organizations SOC 2 report as part of a governance, risk and compliance (GRC) program; vendor assessment; security evaluation; business continuity plan, or other control evaluation. It may also be useful to those considering requesting a SOC 2 report from an existing vendor that does not currently provide a report or from a new vendor as part of the due-diligence or request-for-proposal (RFP) process. AICPA and ISACA have jointly released this guide to provide user entities with the information they need when interpreting the SOC 2 reports received from service organizations.
Member: US $35.00 Nonmember: US $75.00Available in print SOC and eBook WSOC
Once more the Unto the Breach: Managing information Security in an Uncertain WorldAndrea Simmons
In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insiders view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project
Member: US $46.00Nonmember: US $56.0014ITOM
Auditors Guide to IT Auditing and Software Demo, 2nd Edition Richard E. Cascarino
Many Auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Auditors Guide to IT Auditing presents an easy, practical guide for auditors that can be applied to all computing environments.
Follow the approach used by the Information System Audit and Control Associations model curriculum, making this book a practical approach for IS auditing
Serves as an excellent study guide for those preparing for the CISA and CISM exams
Includes discussion of risk evaluation methodologies, new regulations, SOX, privacy, banking, IT governance, COBIT, outsourcing, network management and the Cloud
Member: US $95.00Nonmember: US $105.00 53WAG2
-
Book Review www.isaca.org/bookreviews Member Complimentary PDF Download www.isaca.org/downloads
50 512014 BOOKSTORE CATALOG
Audit, Control, Security Audit, Control, Security
Protecting Industrial Control Systems From Electronic ThreatsJoe Weiss
Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cybersecurity is getting much more attention and SCADA security (supervisory control and data acquisition) is a particularly important part of this field, as are distributed control systems (DCS), programmable logic controllers (PLCs), remote terminal units (RTUs), intelligent electronic devices (IEDs), and all other field controllers, sensors, drives and emission controls that make up the intelligence of modern industrial buildings and facilities.
Member: US $109.00Nonmember: US $119.00 1MPPI
Security, Audit and Control Features Oracle Database, 3rd EditionISACA
Protecting information assets is challenging for every enterprise, regardless of size and industry, and it has become an even more complex task for enterprises adopting distributed computing environments.Security, Audit and Control Features Oracle Database, 3rd Edition provides a new perspective of security and controls over Oracle. This updated edition includes a background and review of security controls and addresses the risks associated with protecting information in a distributed computing environment of various platforms, versions, interfaces and tools.
Member: US $40.00Nonmember: US $55.00 ODB9
SPECIFIC ENVIRONMENTS
Applied Oracle Security: Developing Secure Database and Middleware EnvironmentsDavid Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark and Bryan Wise
This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle Database and Oracle Middleware environments. Readers will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and Secure Business Intelligence Applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in todays IT world.
Member: US $60.00Nonmember: US $70.00 18MAO
Identity Management: Concepts, Technologies, and SystemsElisa Bertino and Kenji Takahashi
Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enh