Your shopping cart is currently empty.
Site Map
Categories
-
Books
-
Asset Management & Auditing
-
Business & IT Strategy
-
Business Continuity & ISO22301
-
Change Management
-
Climate Change
-
Cloud Computing
-
Cyber Security
-
Green IT
-
Information Security & ISO27001
-
IT Governance
-
IT Law & Regulatory Compliance
-
ITSM & ITIL
-
Management Systems
-
Project Management
-
Soft Skills
-
Asset Management & Auditing
-
Toolkits
-
Toolkits Asset Management & Auditing
-
Toolkits Business & IT Strategy
-
Toolkits Business Continuity & ISO22301
-
Toolkits Climate Change
-
Toolkits Cyber Security
-
Toolkits Information Security & ISO27001
-
Toolkits IT Governance
-
Toolkits IT Law & Regulatory Compliance
-
Toolkits ITSM & ITIL
-
Toolkits Management Systems
-
Toolkits Project Management
-
Toolkits Asset Management & Auditing
- Training Aids
Departments
-
Author
-
Abdullah Al Hour
-
Alan Calder
-
Alan Field
-
Alan Shipman
-
Andrea Simmons
-
Andrew Vladimirov
-
Andriej Michajlowski
-
Andy Nichols
-
Angelo Esposito
-
Asif Hayat Khan
-
AXELOS AXELOS
-
Barry Kouns
-
Bernard Golden
-
Bill Hagestad
-
Brian Honan
-
Brian Johnson
-
Bridget Kenyon
-
Bryan Altimas
-
Charles Araujo
-
Christopher Wright
-
Claire Agutter
-
Colin Bentley
-
CREST
-
Dan Swanson
-
Daniel McLean
-
David Clifford
-
David Wright
-
Dr. Brian Sutton
-
Dr. Robina Chatham
-
Elizabeth Scanlon Thomas
-
Evan Leybourn
-
Geoff Harmer
-
George Spafford
-
Geraint Williams
-
Graham Day
-
IT Governance
-
IT Governance Publishing
-
ITGP Privacy Team
-
Jake Kouns
-
Jamie Lynn Cooke
-
Jane Whyatt
-
Jared Carstensen
-
Jenny Dugmore
-
Jimmy Desai
-
John Kyriazoglou
-
JP Morgenthal
-
Julie Mehan
-
Kai Roer
-
Karen Worstell
-
Kathy Mills
-
Kerry Wills
-
Kevin Henry
-
Kevin T. McDonald
-
Konstantin Gavrilenko
-
Kurt McWhirter
-
Lee Newcombe
-
Léon-Paul de Rouw
-
Leron Zinatullin
-
Lori Mac Vittie
-
Mark Stanislav
-
Mark Thomas
-
Martyn Hobbs
-
Michael Krausz
-
Michael Kunas
-
Michael Streeter
-
Naeem Sadiq
-
Naomi Karten
-
Nick Orchiston
-
Pamela Erskine
-
Paul Dowland
-
Paul Kearney
-
Paul Ticher
-
Peter Warren
-
Philip Wood
-
Premanand Doraiswamy
-
Premi Shiv
-
Preston Bukaty
-
Prof. John Walker
-
Richard Bingley
-
Rob Zanella
-
Robert Clark
-
Robert E. Kress
-
Rod Beecham
-
Roger Williams
-
Rory Canavan
-
Rosemary Jay
-
Sarah Cook
-
Sean Robson
-
Shirley Lacy
-
Steve Furnell
-
Steve Moir
-
Steve Sarsfield
-
Steve Watkins
-
Stewart Bertram
-
Sumner Blount
-
Susan Tuttle
-
Suzanne Van Hove
-
Ted Gaughan
-
Thejendra BS
-
Thomas Smedinghoff
-
Timothy Rogers
-
Tom Graves
-
Tom Mooney
-
Tony Drewitt
-
Toomas Viira
-
Valerie Maddock
-
Victoria Loewengart
-
Vinod Vasudevan
-
Walter Zondervan
-
Waylon Krush
-
Abdullah Al Hour
- Format
- Language
Products
- 21st Century Chinese Cyberwarfare
- 50 Top IT Project Management Challenges
- A concise introduction to the NIS Directive
- A Guide to Effective Internal Management System Audits
- A Manager's Guide to ISO22301
- ABMS Anti Bribery Documentation Toolkit
- Above the Clouds
- Agile Governance and Audit
- Agile Principles Unleashed
- Agile Productivity Unleashed
- Agile SAP
- Agile: An Executive Guide
- An Introduction to Anti-Bribery Management Systems (BS 10500)
- An Introduction to Hacking and Crimeware
- An Introduction to Information Security and ISO27001:2013
- Application security in the ISO27001:2013 Environment
- Assessing Information Security
- Assessing IT Projects to Ensure Successful Outcomes
- Availability and Capacity Management in the Cloud
- Breaking the Addiction to Process
- BS 31111 Gap Analysis Tool
- Build a Security Culture
- Building a High Performance Team
- Business Continuity and the Pandemic Threat
- Business Continuity Management
- Business Continuity Risk Management Pack
- Business Management Controls
- Business Management Controls Toolkit
- BYOD Policy Template Toolkit
- Calder Moir IT Governance Framework Toolkit
- Catalogs, Services and Portfolios
- Changing how you manage and communicate change
- Changing the IT Leader's Mindset
- Cloud Computing
- Cloud Security and Governance
- Coaching for High Performance
- Collaborative Business Design
- Collaborative Business Design: The Fundamentals
- Controles estratégicos y operacionales de la TI
- Coping with Unplanned Absences
- Critical Issues Series
- Cyber Essentials
- Cyber Essentials Gap Analysis
- Cyber Essentials Toolkit
- Cyber Security Governance and Risk Management Toolkit
- Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition)
- Data Privacy Template Pack
- Data Protection and the Cloud
- Data Protection and the Cloud - Are you really managing the risks?
- Data Protection Awareness Posters
- Data Protection Compliance in the UK
- Data Protection Policy (GDPR_DOC_1.0)
- Data Security and Protection (DSP) Toolkit Documentation Templates
- Data Security and Protection (DSP) Toolkit v2.0
- Directing the Agile Organisation
- Disaster Recovery and Business Continuity
- E-mail Security
- Enterprise Architecture
- ESOS & ISO 50001 Toolkit
- ESOS & ISO50001 Energy Management System Documentation Toolkit
- Essential Time Management and Organisation
- Establishing an occupational health & safety management system based on ISO 45001
- EU GDPR
- EU GDPR - A Pocket Guide (European) second edition
- EU GDPR - A pocket guide, second edition
- EU GDPR & EU-U.S. Privacy Shield: A pocket guide, second edition
- EU GDPR & EU-US Privacy Shield
- EU GDPR Compliance Gap Assessment Tool
- EU GDPR Consent and Withdrawal Pack
- EU GDPR Gap Assessment Tool for Schools
- EU GDPR Gap Assessment Tool for the legal sector
- EU GDPR Retention Schedule Pack
- EU GDPR: A Pocket Guide (European)
- EU GDPR: A Pocket Guide, School's edition
- EU General Data Protection Regulation (GDPR)
- EU General Data Protection Regulation (GDPR) Documentation Toolkit v2.0
- EU General Data Protection Regulation (GDPR), third edition
- EU-DSGVO
- Everything you want to know about Agile
- Everything you want to know about Business Continuity
- Exploding the Myths Surrounding ISO9000
- Fundamentals of Assurance for Lean Projects
- Fundamentals of Information Security Risk Management Auditing
- Governance and Internal Controls for Cutting Edge IT
- Governance of Enterprise IT based on COBIT 5
- How Cyber Security Can Protect Your Business
- I nove passi per il successo
- ICT Strategy Toolkit
- Implementación de Calidad de Servicio basado en ISO/IEC 20000
- Implementierung von Service-Qualita basierend auf ISO/IEC 20000
- Implementing an Integrated Management System (IMS)
- Implementing Service Quality based on ISO/IEC 20000
- In Hindsight
- Information Security A Practical Guide
- Information Security Awareness Posters
- Information Security Breaches
- Information Security Law
- Information Security Policy (ISMS DOC 5.2)
- Information Security Risk Management for ISO 27001/ISO 27002, third edition
- Information Security Risk Management for ISO27001/ISO27002
- Insider Threat
- Integrated Measurement - KPIs and Metrics for ITSM
- ISMS Card Game
- ISO 14001 - 2015 EMS Documentation Toolkit Bolt-on
- ISO 14001 2015 EMS Documentation Toolkit
- ISO 14001 Step by Step - A Practical Guide
- ISO 14001:2004 to ISO 14001:2015 Conversion Tool
- ISO 14001:2004 to ISO 14001:2015 Gap Analysis Tool
- ISO 22301 BCMS Documentation Toolkit
- ISO 27001 controls – A guide to implementing and auditing
- ISO 27001 Cybersecurity Documentation Toolkit - US version
- ISO 27001 ISMS Documentation Toolkit Bolt-on
- ISO 27701 Gap Analysis Tool
- ISO 37001
- ISO 37001:2016 ABMS Documentation Toolkit
- ISO 45001:2018 OHSMS Documentation Toolkit
- ISO 50001
- ISO 50001 Toolkit
- ISO 9001 2008 Quality Management System Documentation Toolkit
- ISO 9001 2008 to ISO 9001 2015 Gap Analysis Tool
- ISO 9001 2015 QMS Documentation Toolkit Bolt-on
- ISO 9001 2015 Quality Management System (QMS) Documentation Toolkit
- ISO 9001:2008 to ISO 9001:2015 Conversion Tool
- ISO 9001:2015
- ISO Project Initiation Documentation (PID) Toolkit
- ISO/IEC 20000
- ISO/IEC 20000 Documentation Toolkit
- ISO/IEC 27701:2019: An introduction to privacy information management
- ISO/IEC 38500
- ISO/IEC 38500: A pocket guide, second edition
- ISO14001 2004 EMS Documentation Toolkit
- ISO14001 Step by Step
- ISO19770-1:2012 SAM Process Guidance
- ISO22301
- ISO27001 2013 ISMS Standalone Documentation Toolkit
- ISO27001 in a Windows Environment
- ISO27001/ISO27002: Ein Taschenführer
- ISO27001/ISO27002: Guida tascabile
- ISO27001/ISO27002: Un guide de poche
- ISO27001/ISO27002: Una guía de bolsillo
- ISO27001/ISO27002:2013
- ISO27001:2013 Assessments Without Tears
- ISO27001:2013 ISMS Gap Analysis Tool
- ISO27002:2013 ISMS Controls Gap Analysis Tool
- ISO9001 2015 Gap Analysis Tool
- IT Asset Management
- IT for Business (IT4B)
- IT Governance
- IT Governance Control Framework Implementation Toolkit
- IT Governance to Drive High Performance
- IT Governance Today
- IT Governance: Guidelines for Directors
- IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT
- IT Induction and Information Security Awareness
- IT Project Management
- IT Strategic and Operational Controls
- ITIL and Organizational Change
- ITIL Foundation Essentials
- ITIL Foundation, ITIL 4 Edition
- ITIL Lifecycle Essentials
- ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
- ITIL® Foundation Essentials – ITIL 4 Edition
- It's All About Relationships
- ITSM, ITIL & ISO20000 Implementation Toolkit
- Lead Auditor Toolkit
- Leading for Success
- Lessons Learned: Critical Information Infrastructure Protection
- Making a Success of Managing and Working Remotely
- Managing in a Service-Focused World
- Managing Information Security Breaches
- Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers
- Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services
- Neuf étapes vers le succès
- Neun Schritte zum Erfolg
- Nine Steps to Success
- Nine Steps to Success: North American edition
- NIS Regulations Documentation Toolkit
- NIST Cybersecurity Framework
- Nueve pasos para el éxito
- OHSAS 18001 Occupational Health & Safety Toolkit
- OHSAS 18001 Step by Step
- Once more unto the Breach
- PCI DSS
- PCI DSS Documentation Compliance Toolkit
- PCI DSS Documentation Toolkit
- PCI DSS: A pocket guide, sixth edition
- Penetration Testing
- Penetration Testing Services Procurement Guide
- Phishing Awareness Posters
- Practical IT Service Management
- Pragmatic Application of Service Management
- Presentation Skills for Technical Professionals
- PRINCE2 Agile An Implementation Pocket Guide
- PRINCE2 in Action
- Privacy Notice (GDPR REC 4.1)
- Privacy Procedure (GDPR DOC 2.1)
- Procuring Penetration Testing Services
- Project Governance
- Reglamento General de Protección de Datos (RGPD) de la UE
- Release and Deployment
- Resilient Thinking
- Reviewing IT in Due Diligence
- RGPD UE
- Running IT Like a Business
- Securing Cloud Services
- Security
- Security in the Digital World
- Selling Information Security to the Board
- Service Level Agreements
- SIAM/MSI
- Software Life Cycle Management Standards
- SWANSON on Internal Auditing
- Ten Steps to ITSM Success
- The California Consumer Privacy Act (CCPA)
- The Case for ISO27001:2013
- The Chief Information Security Officer
- The Concise PRINCE2
- The Concise PRINCE2® - Principles and essential themes
- The Data Governance Imperative
- The Definitive Guide to IT Service Metrics
- The Effective Manager
- The ITSM Iron Triangle
- The Power of the Agile Business Analyst, second edition
- The Psychology of Information Security
- The Quantum Age of IT
- The Security Consultant's Handbook
- The Tao of Open Source Intelligence
- The True Cost of Information Security Breaches and Cyber Crime
- Two-Factor Authentication
- UE-RGDP
- Validating Your Business Continuity Plan
- Web Application Security is a Stack