journal header

Volume 5, 2015

This Week's Online-Exclusive Feature

Book Review: Computer Security Handbook, 6th Edition
30 September 2015
Reviewed by Dino Ippoliti, CISA, CISM

Many students and young professionals want to know which topics they should master in the information security field. The answer is contained in the two volumes of the Computer Security Handbook, which has 75 chapters, written by industry professionals. The sixth edition provides an update to the content of each chapter while maintaining the structure of the previous edition, which was released in 2009.

The book covers the 10 domains of the Common Body of Knowledge by the International Information Systems Security Certification Consortium, Inc., (ISC)2. Read More >>

Indicates Online-Exclusive Content



This Week's Featured Author Blog

Understanding Cyberhacking Tools and Techniques
5 October 2015
Omar Y. Sharkasi

It seems like every day there is a new data breach or heist. Hackers break into corporate or government computers and swipe names, addresses, birth dates and those all-important US Social Security numbers. Consider these recent breaches:

  • Hackers hit the jackpot when they cracked the network at the US government’s Office of Personnel Management and accessed Social Security numbers, dates of birth and other personal information of more than 4 million federal workers.
  • Unidentified Russian hackers broke into an unclassified email system used by the US Joint Chiefs of Staff.

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Auditors and Large Software Projects, Part 1: Can Auditors Prevent Project Failure?

Helping Auditees Prepare for an IS/IT Audit

The Soft Skills Challenge

Successful Audits Do Not Just Happen

Perspectives From a Seasoned Practitioner

The Core of IT Auditing


Full Journal Issues

Volume 5, 2014 Mobile Devices

Volume 4, 2014 Governance and Management of Enterprise IT (GEIT)

Volume 3, 2014 Big Data

Volume 2, 2014 The IS Audit Transformation

Volume 1, 2014 Data Privacy

Volume 6, 2013 Security and Compliance