Click on any of the product categories below to see what is available from our online shop:
Here you will find books and tools on the subject of Enterprise Risk Management (ERM). The book and tools in this category provide effective tools and techniques for ERM.
We offer an extensive range of books covering the diverse subject of Risk Management (RM) as a whole.
An information technology (IT) audit or information systems (IS) audit is an examination of the controls within an organisations information technology infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization's information systems, processes, and operations. This evidence & evaluation can then be used to ensure IT's alignment with business goals or objectives, as well as safeguard assets and maintain data integrity. Find a wide range of books, standards and tools on IT and IS Audit below.
M_o_R is a methodology developed by the OGC to help organisations put in place effective risk management framework. These books and tools aid with using M_o_R to establish a successful risk management framework and provide best practice advice.
These books deal with Operational Risk Management (ORM) - particularly in a Basel2 environment - with practical implementation guidance. All financial sector organizations - any many others - should get to grips with ORM.
Within any project there is a certain element of risk, managing this risk is essential to the success of the overall project. Project Risk Management is the management of risk within projects, and is made up of two stages 1) risk assessment, 2) risk control. The books and tools within this sub-category aid with Project Risk Management in general and guide individuals step-by-step through the above two stages.
Here you will find international standards on the subject of Risk Management. Standards including ISO31000, BS 7799-3, AS/NZS 4360, JIS Q 2001, and more.
White collar crime has become a hot topic; the majority of information security incidents now originate INSIDE the corporate secure perimeter. Managers and Infosec professionals need to have a better understanding of computer crime, and the crucial role of computer forensics in the aftermath of an incident.
Online payments are securely processed by Paypal, and we accept the credit, debit and payment cards shown below. We accept PayPal and wire transfer payments.