Information Technology Reference
In-Depth Information
references
Arnason, Sigurjon Thor and Willett, Keith D., 2008,
How to Achieve ISO 27001 Certifica-
tion—An Example of Compliance Management
, Auerbach Publications, Boca Raton,
FL.
Booth-Butterfield, Steve,
Steve's Primer of Practical Persuasion and Influence,
, 1996, West
Virginia University, Morgantown. (http://www.as.wvu.edu/~sbb/comm221/primer.
htm, accessed July 2004
Bosworth, Seymour, and Kabay, M.E., Eds., 2002,
Computer Security Handbook 4
th
Edi-
tion
, John Wiley & Sons, Hoboken, NJ.
The Business Continuity Institute, 2002,
Business Continuity Management - Good Practice
Guide
, (www.thebci.org, last accessed February 2008)
Campbell, Quinn, and Kennedy, David M., 2002, “The Psychology of Computer Crimi-
nal” in the
Computer Security Handbook 4
th
Edition,
Bosworth, Seymou,r and Kabay,
M.E., Eds., John Wiley & Sons, Hoboken, NJ.
Carnegie Mellon University, February 2002,
INFOSEC Assessment Capability Maturity
Model (IA-CMM) v2.1
, Pittsburgh, PA.
Carnegie Mellon University, June 15, 2003,
Systems Security Engineering - Capability Matu-
rity Manual, Model Description Document, v3.0
, Pittsburgh, PA.
Christensen, Clayton M., Anthony, Scott D., and Roth, Erik A., 2004,
Seeing What's Next
,
Harvard Business School Press, Cambridge, MA.
Cobb, Stephen, 2002,
Notes on System Penetration as included in lecture notes in Norwich
University Masters Program in Information Assurance (MSIA)
, Northfield, VT.
Diamond, Jennifer, 2003,
Aligning the Organization for IT Project Success: Improving Cus-
tomer Acceptance and ROI
, Management Agility, Inc.
Dickson, Douglas N., 1983,
Using Logical Techniques for Making Better Decisions,
John
Wiley & Sons, Hoboken, NJ.
Federal Enterprise Architecture Documents (http://www.whitehouse.gov/omb/egov/a-1-
fea.html, accessed March 2008)
•
Business Reference Model, v. 2.0
•
Performance Reference Model, v. 1.0
•
Technical Reference Model, v. 2.0
•
Data and Information Reference Model, v. 1.0
555