Goodwin et al., 2013
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Stallings | Effective cybersecurity: a guide to using best practices and standards | |
| Goodwin et al. | A framework for cybersecurity information sharing and risk reduction | |
| Goodwin et al. | Developing a National strategy for CyberSecurity | |
| Schou et al. | Information Assurance Handbook | |
| PN et al. | Information security in supply chains: A management control perspective | |
| Lanz | Cybersecurity Governance: The Role of the Audit Committee and the CPA. | |
| Nyarko et al. | Cyber security compliance among remote workers | |
| Schreider | Building an effective cybersecurity program | |
| Upfold et al. | An investigation of information security in small and medium enterprises (SME's) in the Eastern Cape | |
| Deane et al. | The Official (ISC) 2 CISSP CBK Reference | |
| Onatuyeh et al. | Cybersecurity and Business Survival in Nigeria: Building Customer's Trust | |
| Tari Schreider et al. | Building effective cybersecurity programs: a security manager’s handbook | |
| Mortazavi-Alavi | A risk-driven investment model for analysing human factors in information security | |
| Ansar et al. | Cost-effective cybersecurity framework for small and medium-sized enterprises | |
| Tarimo | ICT security readiness checklist for developing countries: A social-technical approach | |
| Calder et al. | International IT governance: an executive guide to ISO 17799/ISO 27001 | |
| Jøsang | Governance and Information Security Management | |
| Edwards | Security Awareness and Skills Training | |
| Mbah | Advancing data protection in Nigeria: the need for comprehensive legislation | |
| Moulton | Cybersecurity and Trade: The Increasing Use of Cybersecurity Measures and their Impact on International Trade | |
| Bellasio et al. | Developing Cybersecurity Capacity | |
| Martin et al. | Power sector cybersecurity building blocks | |
| Sukachova et al. | Strategies to strengthen cybersecurity for business resilience in the digital age | |
| Nachtigal | E-business Information Systems Security Design Paradigm and Model | |
| MEADE et al. | Attacking Cybersecurity from the Inside Out. |