انتشارات It Governance
![Changing the IT Leaders Mindset](http://cdn.ketabkoo.com/covers/1/115097-n.jpg)
Changing the IT Leaders Mindset
Robina Chatham, Brian Sutton, 2010![Breaking the addiction to process : an introduction to agile project management.](http://cdn.ketabkoo.com/covers/1/147899-n.jpg)
Breaking the addiction to process : an introduction to agile project management.
Elizabeth Scanlon Thomas, 2011.![Building a High-Performance Team](http://cdn.ketabkoo.com/covers/1/199821-n.jpg)
Building a High-Performance Team
Sarah Cook, 2009![Above the clouds : managing risk in the world of cloud computing](http://cdn.ketabkoo.com/covers/2/216797-n.jpg)
Above the clouds : managing risk in the world of cloud computing
Kevin T McDonald, 2010![Above the Clouds: Managing Risk in the World of Cloud Computing](http://cdn.ketabkoo.com/covers/2/216798-n.jpg)
Above the Clouds: Managing Risk in the World of Cloud Computing
Kevin T. McDonald, 2010![Computer Forensics: A Pocket Guide](http://cdn.ketabkoo.com/covers/2/262504-n.jpg)
Computer Forensics: A Pocket Guide
Nathan Clarke, 2010![Computer Forensics: A Pocket Guide](http://cdn.ketabkoo.com/covers/2/262505-n.jpg)
Computer Forensics: A Pocket Guide
Nathan Clarke, 2010![Assessing Information Security Strategies Tactics Logic and Framework](http://cdn.ketabkoo.com/covers/3/378648-n.jpg)
Assessing Information Security Strategies Tactics Logic and Framework
Andrew Vladimirov, 2010![An Introduction to Information Security and ISO 27001](http://cdn.ketabkoo.com/covers/4/449416-n.jpg)
An Introduction to Information Security and ISO 27001
Steve G Watkins, 2008![Application Security in the ISO27001 Environment](http://cdn.ketabkoo.com/covers/4/449417-n.jpg)
Application Security in the ISO27001 Environment
Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, 2008![Changing How You Manage and Communicate Change](http://cdn.ketabkoo.com/covers/4/449418-n.jpg)
Changing How You Manage and Communicate Change
Naomi Karten, 2013![Cloud Computing : Assessing the Risks](http://cdn.ketabkoo.com/covers/4/449419-n.jpg)
Cloud Computing : Assessing the Risks
Jared Carstensen, 2012![Cyber Risks for Business Professionals A Management Guide](http://cdn.ketabkoo.com/covers/4/449421-n.jpg)
Cyber Risks for Business Professionals A Management Guide
Rupert Kendrick, 2010![Cyberwar, Cyberterror, Cybercrime and Cyberactivism](http://cdn.ketabkoo.com/covers/4/449422-n.jpg)
Cyberwar, Cyberterror, Cybercrime and Cyberactivism
Julie E. Mehan, 2014![E mail Security A Pocket Guide](http://cdn.ketabkoo.com/covers/4/449423-n.jpg)
E mail Security A Pocket Guide
Paul Dowland, 2010![E-Mail Security: A Pocket Guide](http://cdn.ketabkoo.com/covers/4/449424-n.jpg)
E-Mail Security: A Pocket Guide
It Governance Publishing, 2010![Everything you want to know about Business Continuity](http://cdn.ketabkoo.com/covers/4/449425-n.jpg)