ISO 27001 Texts Page


Arnason, S. T. and Willett, K. D. (2007).  How to Achieve 27001 Certification: An Example of Applied Compliance Management.  Boca Raton, Fl: Auerbach.

 Calder, A. and Watkins, S. (2010). IT Governance: A Manager’s Guide to Data Security and ISO27001/ISO27002, 4th edition. London, UK: Kogan Page.

Davis, C. (2011). IT Auditing Using Controls to Protect Information Assets, 2nd Edition.  New York, NT: McGraw-Hill Media.

Hayden,  L. (2010).  IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data. New York, NY:  McGraw-Hill Media.

Vasudevan, V., et al. (2008). Application Security in the ISO27001 Environment.  Cambs, UK: IT Governance.


Business Continuity and Incident Management

Gregory, P. (2008). IT Disaster Recovery and Planning for Dummies. Indianapolis, IN: Wiley Publishing.

Wallace, M. and Webber, L. (2011). The Disaster Recover Handbook: A Step-by-Step Guide to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets, second edition: New York, NY: American Management Association.

Watters, J. (2010). The Business Continuity Management Desk Reference: Guide to Business Continuity Planning, Crisis Management & IT Disaster Recovery. Northamptonshire, UK: Leverage Publishing.

Whitman, M. E. and Mattord, H. J. (2007). Principles of Incident Response & Disaster Recovery. Boston, MA: Course Technology – Cengage Learning.

Van Wyk, K R. and Forno, R. (2001). Incident Response. Sebastopol, CA: O’Reilly.




ISO 27001 Resource Page


Copyright 1996 - 2012 by William F. Slater, III,
Chicago, IL, USA
All Rights Reserved, Nationally and Internationally.

Last Updated: Friday, November 02, 2012