Information Technology Reference
In-Depth Information
references
Arnason, Sigurjon Thor and Willett, Keith D., 2008, How to Achieve ISO 27001 Certifica-
tion—An Example of Compliance Management , Auerbach Publications, Boca Raton,
FL.
Booth-Butterfield, Steve, Steve's Primer of Practical Persuasion and Influence, , 1996, West
Virginia University, Morgantown. (http://www.as.wvu.edu/~sbb/comm221/primer.
htm, accessed July 2004
Bosworth, Seymour, and Kabay, M.E., Eds., 2002, Computer Security Handbook 4 th Edi-
tion , John Wiley & Sons, Hoboken, NJ.
The Business Continuity Institute, 2002, Business Continuity Management - Good Practice
Guide , (www.thebci.org, last accessed February 2008)
Campbell, Quinn, and Kennedy, David M., 2002, “The Psychology of Computer Crimi-
nal” in the Computer Security Handbook 4 th Edition, Bosworth, Seymou,r and Kabay,
M.E., Eds., John Wiley & Sons, Hoboken, NJ.
Carnegie Mellon University, February 2002, INFOSEC Assessment Capability Maturity
Model (IA-CMM) v2.1 , Pittsburgh, PA.
Carnegie Mellon University, June 15, 2003, Systems Security Engineering - Capability Matu-
rity Manual, Model Description Document, v3.0 , Pittsburgh, PA.
Christensen, Clayton M., Anthony, Scott D., and Roth, Erik A., 2004, Seeing What's Next ,
Harvard Business School Press, Cambridge, MA.
Cobb, Stephen, 2002, Notes on System Penetration as included in lecture notes in Norwich
University Masters Program in Information Assurance (MSIA) , Northfield, VT.
Diamond, Jennifer, 2003, Aligning the Organization for IT Project Success: Improving Cus-
tomer Acceptance and ROI , Management Agility, Inc.
Dickson, Douglas N., 1983, Using Logical Techniques for Making Better Decisions, John
Wiley & Sons, Hoboken, NJ.
Federal Enterprise Architecture Documents (http://www.whitehouse.gov/omb/egov/a-1-
fea.html, accessed March 2008)
Business Reference Model, v. 2.0
Performance Reference Model, v. 1.0
Technical Reference Model, v. 2.0
Data and Information Reference Model, v. 1.0
555
Search WWH ::




Custom Search