Trust In, and Value From, Information Systems
English
Chinese
(Simplified)
Chinese
(Traditional)
Deutsch
Espanol
Francais
Hebrew
Italiano
Japanese
Korean
Nederlands
Polski
Portuguese
People
Site Content
Conversations
Advanced Search
ABOUT
Membership
CERTIFICATION
Education
COBIT
Knowledge & Insights
Journal
Bookstore
Bylaws and
Articles of
Incorporation
Annual Report
History
What We Offer &
Whom We Serve
@ISACA
Newsletter
Our Purpose
and Promise
Licensing and
Promotion
Press Room
Volunteering
Contact Us
Advocacy
Careers at ISACA
ISACA TV
Professional Membership
Recent Graduate Membership
Student Membership
Member Benefits
NEW! Partner Content Featuring MIT’s Center for Information Systems Research
Local Chapter Information
Join Today
Professional Growth
Global Community
Advance Your Career
What is CISA
What is CISM
What is CGEIT
What is CRISC
Benefits of CISA
Benefits of CISM
Benefits of CGEIT
Benefits of CRISC
How to Become
Certified
How to Become
Certified
How to Become
Certified
How to Become
Certified
February-May Exam Window Information
February-May Exam Window Information
February-May Exam Window Information
February-May Exam Window Information
June-September Exam Window Information
June-September Exam Window Information
June-September Exam Window Information
June-September Exam Window Information
Apply for Certification
Apply for Certification
Apply for Certification
Apply for Certification
Maintain Your CISA
Maintain Your CISM
Maintain Your CGEIT
Maintain Your CRISC
Why Certify
How to Earn CPE
Maintain Your Certification
Write an Exam Question
US DoD Information
Exam Registration
CONFERENCES
TRAINING
ONLINE EVENTS
North America CACS
Interactive Training Tool
Webinars
CSX North America
Training Week
Virtual Conferences
CSX Europe
Exam Review Courses
Virtual Training
EuroCACS
Enterprise Training (On-Site)
Virtual Summit
Africa CACS
Virtual Event
Governance,
Risk and Control
CERTIFICATION TRAINING
& EDUCATION
ON-DEMAND LEARNING
Oceania CACS
Latin CACS
Capability Counts Conference
COBIT EDUCATION
Call for Speakers
Browse All Events
Sponsorship Opportunities
COBIT 5 Home
Publications Directory
COBIT Online
COBIT Conference North America
Training & Accreditation
Licensing
Join the Conversation
News
Recognition
FAQs
COBIT Focus
COBIT 20th Anniversary
Implementing the General Data Protection Regulation
COBIT 5
Cybersecurity Nexus (CSX)
GDPR
Privacy
White Papers
Research (projects/publications)
Communities
IS Audit & Assurance
Academia
NEW! Partner Content Featuring MIT’s Center for Information Systems Research
Career Centre
Glossary
ISACA TV
ISACA Podcast
The Nexus Articles
Current Issue
Archives
Journal Blog
CPE Quizzes
Submit an Article
Advertise
Editorial Calendar
Implementing the General Data Protection Regulation
Implementing the NIST Cybersecurity Framework
Advanced Persistent Threats: How to Manage the Risk to Your Business
Search
Top Sellers
CISA Review Manual, 26
th
Edition
CISA Review Questions, Answers & Explanations Database - 12 Month Subscription
CSX Cybersecurity Fundamentals Study Guide, 2
nd
Edition
CISM Review Questions, Answers & Explanations Database – 12 Month Subscription
ISACA
My ISACA
Support
Shopping Cart
Join ISACA
Reinstate
Sign In
ISACA
>
Knowledge & Insights
>
Research
>
ISACA Publications No Longer Available
ISACA Publications No Longer Available
Knowledge & Insights
COBIT 4.1 (IT Governance & Control)
Risk IT
Val IT (IT Value Delivery)
BMIS (Business Model For Information Security)
IS Audit and Assurance
Research
All Deliverables
White Papers
Cloud Computing Guidance
Cybersecurity Resources
Privacy Resources for You and Your Enterprise
GDPR Readiness, Assessment & Compliance
Audit/Assurance Programs
ISACA Innovation Insights
Academia
NEW! Partner Content Featuring MIT’s Center for Information Systems Research
Glossary
Become a Community Topic Leader
ISACA Now
Activity Badges
Career Centre
COBIT Mapping: Mapping of CMMI for Development V1.2 With COBIT 4.1 (withdrawn March 2018)
Identifying and Aligning Business Goals and IT Goals: Full Research Report (withdrawn March 2018)
Information Security Harmonisation (withdrawn March 2018)
Geolocation: Risk, Issues and Strategies (withdrawn September 2016)
Security, Audit and Control Features SAP® ERP, 3rd Edition (replaced by fourth edition, Jul 2015)
The Risk IT Practitioner Guide (withdrawn 5 June 2015)
IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud (replaced by Controls and Assurance in the Cloud: Using COBIT 5)
IT Control Objectives for Sarbanes-Oxley, 2nd Edition (replaced by third edition Nov. 2014)
ITAF: A Professional Practices Framework for IT Assurance (replaced by 2nd Edition July 2013)
Introduction to Voice-over IP Technology (withdrawn 16 Jan. 2013)
Risk and Control of Biometric Technologies: A Security, Audit and Control Primer (withdrawn 16 Jan. 2013)
Peer-to-peer Networking Security and Control (withdrawn 16 Jan. 2013)
Electronic and Digital Signatures: A Global Status Report (withdrawn 16 Jan. 2013)
e-Commerce Security: Securing the Network Perimeter (withdrawn 16 Jan. 2013)
A Guide To Cross-Border Privacy Impact Assessments (withdrawn 16 Jan. 2013)OS/390-z/OS Security, Audit and Control Features (Out of print Nov. 2012)
Biometric Technologies SAQ and ICQ (Replaced by Biometric Audit/Assurance Program Nov 2012)
E-commerce Security Public Key Infrastructure Symmetrical (Private) Key Encryption (Replaced by E-commerce and Public Key Infrastructure Audit/Assurance Program (Oct 2012)
Security, Audit and Control Features PeopleSoft, 2nd Edition (Out of Print Jan 2012)
Cybercrime: Incident Response and Digital Forensics Services Project (Out of Print Nov 2011)
Managing Enterprise Information Integrity (Out of Print Nov 2011)
Enterprise Identity Management (Out of Print Nov 2011)
Security Provisioning: Managing Access in Extended Enterprises Jun 2002 (Out of Print Dec 2010)