View All Book Series

Security, Audit and Leadership Series

About the Book Series

The scope and mandate for cybersecurity and internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.

Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT and Technology, and Audit Management and Leadership.

If you're interested in submitting a proposal for a book to be included in the series, please email the series editor, Dan Swanson: [email protected] 

126 Series Titles


Controlling Privacy and the Use of Data Assets - Volume 2 What is the New World Currency – Data or Trust?

Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust?

1st Edition

By Ulf Mattsson
August 24, 2023

The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity, Trust, and data’s business utility. Based on a ...

Leading the Digital Workforce IT Leadership Peak Performance and Agility

Leading the Digital Workforce: IT Leadership Peak Performance and Agility

1st Edition

By Jeffrey W. Brown
June 19, 2023

Future IT leaders won't be technology leaders, they'll be business leaders who understand technology. Leading the Digital Workforce takes a fresh look at technology leadership, exploring how to lead and manage in today’s digital workplace where the pace of change is exponential. This book walks you...

Cognitive Risk

Cognitive Risk

1st Edition

By James Bone, Jessie H Lee
April 18, 2023

Cognitive Risk is a book about the least understood but most pervasive risk to mankind – human decision-making. Cognitive risks are subconscious and unconscious influence factors on human decision-making: heuristics and biases. To understand the scope of cognitive risk, we look at case studies, ...

Privacy in Practice Establish and Operationalize a Holistic Data Privacy Program

Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program

1st Edition

By Alan Tang
March 01, 2023

Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. ...

Teaching Cybersecurity A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom

Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom

1st Edition

By Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
February 15, 2023

Let’s be realistic here. Ordinary K-12 educators don’t know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical...

Artificial Intelligence Perspective for Smart Cities

Artificial Intelligence Perspective for Smart Cities

1st Edition

Edited By Vahap Tecim, Sezer Bozkus Kahyaoglu
November 23, 2022

The concept of a "smart city" is used widely in general; however, it is hard to explain because of the complexity and multidimensionality of this notion. However, the essential qualification for being a smart city is to achieve "sustainable social, environmental, and economic development" and boost...

The Auditor’s Guide to Blockchain Technology Architecture, Use Cases, Security and Assurance

The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

1st Edition

By Shaun Aghili
November 03, 2022

The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its most disruptive is blockchain technology whose origin dates to only 2008, when an individual (or perhaps a group of ...

CyRM Mastering the Management of Cybersecurity

CyRM: Mastering the Management of Cybersecurity

1st Edition

By David X Martin
November 01, 2022

Is your enterprise’s strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so…you’re not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach...

Mind the Tech Gap Addressing the Conflicts between IT and Security Teams

Mind the Tech Gap: Addressing the Conflicts between IT and Security Teams

1st Edition

By Nikki Robinson
October 05, 2022

IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how IT and cybersecurity teams interact. With ...

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect  Organizational Fraud

Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

1st Edition

By Shaun Aghili
August 29, 2022

This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also ...

Implementing Cybersecurity A Guide to the National Institute of Standards and Technology Risk Management Framework

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

1st Edition

By Anne Kohnke, Ken Sigler, Dan Shoemaker
August 29, 2022

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain ...

Internet of Things, for Things, and by Things

Internet of Things, for Things, and by Things

1st Edition

By Abhik Chaudhuri
August 29, 2022

This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally ...

85-96 of 126
AJAX loader