Information Security A Practical Guide: Bridging the gap between IT and management (2015)
CHAPTER 1. DAY ONE AS A SECURITY PROFESSIONAL
CHAPTER 2. BUSINESS IMPACT OF BREACHES
CHAPTER 3. BUSINESS RISK APPETITE
CHAPTER 5. QUICK AND DIRTY RISK ASSESSMENT
CHAPTER 6. GETTING BUY-IN FROM YOUR PEERS
CHAPTER 7. DOCUMENTING THE SYSTEM FOR EVERYONE
CHAPTER 8. MAPPING DATA IN THE SYSTEM
CHAPTER 9. PENETRATION TESTING
CHAPTER 10. INFORMATION SECURITY POLICY