Book Reviews Archive
The newly released IBM X-Force Threat Intelligence Quarterly, 3Q 2015 focuses on ransomware (a cybersecurity threat largely overlooked by the media in favor of data breaches) and the Tor network as a means of spreading ransomware-as-a-service. Ransomware – malware such …
Views and opinions expressed are that of the author and may not represent IT Governance. I discovered this quote during my recent reading of Charles Araujo’s “The Quantum Age of IT.” It struck me in that it encompassed why IT leaders need …
After I finished reading The Quantum Age of IT by Charles Araujo, I began thinking about the Industrial Revolution that took place during the late 18th century. The Industrial Revolution was the first time we endured a cultural shift as …
Written by service management gurus Suzanne D. Van Hove and Mark Thomas, Pragmatic Application of Service Management is the first book to provide guidance on creating an integrated IT service management (ITSM) system based on the three leading service management …
Understand the dark world of cyber crime with five of our most interesting cyber security books of all time.