انتشارات It Governance Publishing
![Changing the IT Leaders Mindset](http://cdn.ketabkoo.com/covers/1/115097-n.jpg)
Changing the IT Leaders Mindset
Robina Chatham, Brian Sutton, 2010![Building a High-Performance Team](http://cdn.ketabkoo.com/covers/1/199821-n.jpg)
Building a High-Performance Team
Sarah Cook, 2009![Above the Clouds: Managing Risk in the World of Cloud Computing](http://cdn.ketabkoo.com/covers/2/216798-n.jpg)
Above the Clouds: Managing Risk in the World of Cloud Computing
Kevin T. McDonald, 2010![Computer Forensics: A Pocket Guide](http://cdn.ketabkoo.com/covers/2/262504-n.jpg)
Computer Forensics: A Pocket Guide
Nathan Clarke, 2010![Computer Forensics: A Pocket Guide](http://cdn.ketabkoo.com/covers/2/262505-n.jpg)
Computer Forensics: A Pocket Guide
Nathan Clarke, 2010![Assessing Information Security Strategies Tactics Logic and Framework](http://cdn.ketabkoo.com/covers/3/378648-n.jpg)
Assessing Information Security Strategies Tactics Logic and Framework
Andrew Vladimirov, 2010![An Introduction to Information Security and ISO 27001](http://cdn.ketabkoo.com/covers/4/449416-n.jpg)
An Introduction to Information Security and ISO 27001
Steve G Watkins, 2008![Application Security in the ISO27001 Environment](http://cdn.ketabkoo.com/covers/4/449417-n.jpg)
Application Security in the ISO27001 Environment
Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, 2008![Changing How You Manage and Communicate Change](http://cdn.ketabkoo.com/covers/4/449418-n.jpg)
Changing How You Manage and Communicate Change
Naomi Karten, 2013![Cloud Computing : Assessing the Risks](http://cdn.ketabkoo.com/covers/4/449419-n.jpg)
Cloud Computing : Assessing the Risks
Jared Carstensen, 2012![Cyber Risks for Business Professionals A Management Guide](http://cdn.ketabkoo.com/covers/4/449421-n.jpg)
Cyber Risks for Business Professionals A Management Guide
Rupert Kendrick, 2010![Cyberwar, Cyberterror, Cybercrime and Cyberactivism](http://cdn.ketabkoo.com/covers/4/449422-n.jpg)
Cyberwar, Cyberterror, Cybercrime and Cyberactivism
Julie E. Mehan, 2014![E mail Security A Pocket Guide](http://cdn.ketabkoo.com/covers/4/449423-n.jpg)
E mail Security A Pocket Guide
Paul Dowland, 2010![E-Mail Security: A Pocket Guide](http://cdn.ketabkoo.com/covers/4/449424-n.jpg)
E-Mail Security: A Pocket Guide
It Governance Publishing, 2010![Everything you want to know about Business Continuity](http://cdn.ketabkoo.com/covers/4/449425-n.jpg)
Everything you want to know about Business Continuity
IT Governance Publishing, 2012![Everything you want to know about Organisational Change](http://cdn.ketabkoo.com/covers/4/449426-n.jpg)
Everything you want to know about Organisational Change
IT Governance Publishing, 2011![ISO14001 Step by Step: A Practical Guide](http://cdn.ketabkoo.com/covers/4/449427-n.jpg)
ISO14001 Step by Step: A Practical Guide
Naeem Sadiq, 2011![ISO27001 in a Windows Environment](http://cdn.ketabkoo.com/covers/4/449428-n.jpg)
ISO27001 in a Windows Environment
Brian Honan, 2010![Leading for Success](http://cdn.ketabkoo.com/covers/4/449429-n.jpg)
Leading for Success
Sarah Cook, 2009![Managing Information Security Breaches](http://cdn.ketabkoo.com/covers/4/449430-n.jpg)