Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About the Library
    • A-Z Databases
    • Accessibility Tools
    • All Reading Lists
    • AppsAnywhere
    • Browse Journals
    • eBook Spotlight Collections
    • Research Tools
    • Search the Library
    • Subject Guides

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

COM7005

Information Security Strategy Development

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Management Information Systems

by Laudon, K. C. and Laudon, J. P.
Key Text eBook

Security Strategy: From Requirements to Reality

by Stackpole, B. and Oksendahl, E.
Essential Resource eBook

Information Systems Security

by Prakash, A. and Sen Gupta, I. (eds)
Essential Resource Article

Formal and semi-formal verification of a web…

by Cristia, M. and Frydman, C.
Wider Reading Article

Formal Verification of Business Workflows and…

by Dury, A. et al.

Lesson 2

Key Text eBook

Management Information Systems: Managing the…

by Laudon, K. C. and Laudon, J. P.
Key Text eBook

Security Strategy: From Requirements to Reality

by Stackpole, B. and Oksendahl, E.
Essential Resource Article

Las Vegas Is America’s Playground - And Its…

by Gunn, G. H.
Essential Resource Website

I didn't realize how often Muslims get…

by Mohammad, N.
Essential Resource Website

Southwest Airlines kicks Muslim off a plane for…

by Revesz, R.
Essential Resource eBook

Principles of Information Security

by Whitman, M. E. and Mattord, H. J.
Essential Resource Article

Challenges facing information systems security…

by Okibo, W. B. and Ochiche, O. B.
Essential Resource Article

Towards the design of secure and privacy-oriented…

by Kalloniatis, C. et al.
Essential Resource Article

It’s all about audit quality: Perspectives on…

by Peecher, M. E. et al.
Essential Resource eBook

Fundamentals of Organizational Behaviour

by Kou-Barrett, C.-Y.
Essential Resource Website

Prankster 'kicked off flight for speaking…

by Boult, A.

Lesson 3

Key Text eBook

Software Engineering, Global Edition

by Sommerville, I
Essential Resource eBook

Intelligent Data Analysis and Applications

by Abraham, A., Jiang, X., Snášel, V., Pan, JS. (eds)
Essential Resource Website

OpenOffice

by Apache
Wider Reading eBook

Mastering Software Quality Assurance

by Chemuturi, M.
Wider Reading Article

Requirements gathering: The journey

by Lane, S. et al.
Wider Reading Website

Deming on Management: PDSA Cycle

by Hunter, J.

Lesson 4

Key Text eBook

Managing Risk and Information Security

by Harkins, M. W.
Key Text eBook

Management Information Systems: Managing the…

by Laudon, K. C. and Laudon, J. P.
Key Text eBook

Information Security Management Handbook Volume 5

by Nozaki, M. and Tipton, H.
Essential Resource eBook

Search Methodologies

by Burke, E. K. and Kendall, G. (eds)
Essential Resource Article

A Survey of Artificial Immune System Based…

by Yang, H. et al.
Essential Resource Website

Security Entities Building Block Architecture

by Vilcinskas, M.
Essential Resource Video

The fundamental theorem of arithmetic

by Khan Academy
Wider Reading Article

Towards the realisation of context-risk-aware…

by Ahmed, A. and Zhang, N.
Wider Reading Article

A framework and risk assessment approaches for…

by dos Santos, D. R. et al.
Wider Reading Article

Design of a role-based trust-management framework

by Li, N. et al.
Wider Reading Website

Home page

by Impulsec
Wider Reading Other

Context-Aware Access Control in Ubiquitous…

by Ahmed, A.
Wider Reading Article

Binder, a logic-based security language

by DeTreville, J.
Wider Reading eBook

Intelligent Data Analysis and Applications

by Abraham, A., Jiang, X., Snášel, V., Pan, JS. (eds)
Wider Reading Article

SD3: A trust management system with certified…

by Jim, T.
Wider Reading Article

Trust-aware access control: How recent is your…

by Ahmed, A. and Alnajem, A.
Wider Reading Other

A Profile for U.S. Federal Cryptographic Key…

by Barker et al.

Lesson 5

Key Text eBook

Security Strategy: From Requirements to Reality

by Stackpole, B. and Oksendahl, E.
Essential Resource Article

Information security strategies: Towards an…

by Ahmad, A. et al.
Essential Resource Article

The management of security in Cloud computing

by Ramgovind, S. et al.
Essential Resource eBook

Computational Science and Its Applications –…

by Laganá, A. et al. (eds)
Essential Resource Article

Information systems security policy compliance:…

by Ifinedo, P.
Essential Resource Website

Security Strategies

by Benson, C.
Essential Resource eBook

Information Systems Management in the Big Data Era

by Lake, P. and Drake, R.
Wider Reading Article

Research on cloud computing security problem and…

by Liu, W.
Wider Reading Website

Developing a Cloud Computing Security Strategy

by Blum, D.
Wider Reading Other

New Zealand's Cyber Security Strategy 2019

by DPMC
Wider Reading Website

LISFLOOD - Distributed Water Balance and Flood…

by European Commission

Lesson 6

Key Text eBook

Managing Risk and Information Security

by Harkins, M. W.
Essential Resource Other

An Introduction to Information System Risk…

by Elky, S.
Essential Resource Other

A Practical Information Risk Management Process…

by Landess, D.
Wider Reading Website

Qualys Community Edition

by Qualys
Wider Reading Article

Current challenges in information security risk…

by Fenz, S. et al.
Wider Reading Website

OPENVAS

by Greenbone
Wider Reading eBook

Economics of Information Security and Privacy III

by Schneier, B. (ed)
Wider Reading Other

Supply chain risk management practices for…

by Boyens, J.
Wider Reading Website

SiteCheck scanner

by Sucuri
Wider Reading Website

Free Website Malware Scanner

by web inspector
Wider Reading Article

A Quantitative Model for Information-Security…

by Bojanc, R. and Jerman-Blažič, B.

Lesson 7

Key Text eBook

Managing Risk and Information Security

by Harkins, M. W.
Essential Resource Article

A case study comparison of the analytic hierarchy…

by Ghotb, F. and Warren, L.
Essential Resource Other

Context-Aware Access Control in Ubiquitous…

by Ahmed, A.
Wider Reading Article

An Access Control Architecture for Context-Risk-…

by Ahmed, A. and Zhang, N.
Wider Reading Article

A Context-Risk-Aware Access Control model for…

by Ahmed, A. and Zhang, N.
Wider Reading Article

Towards the realisation of context-risk-aware…

by Ahmed, A. and Zhang, N.

Lesson 8

Key Text eBook

How to Achieve 27001 Certification

by Arnason, S. T. and Willett, K. D.
Essential Resource Video

ITIL Journey - The Incident

by AXELOS Global Best Practice
Essential Resource Other

COBIT 5: A Business Framework for the Governance…

by ISACA
Essential Resource Website

What is the IT Infrastructure Library (ITIL)?

by Susnjara, S. and Smalley, I.
Essential Resource Video

Nmap Tutorial For Beginners | How to Scan Your…

by edureka!
Wider Reading Article

COBIT 5 and Enterprise Governance of Information…

by De Haes, S. et al.
Wider Reading Article

The Information Artifact in IT Governance: Toward…

by Tallon, P. P. et al.

Lesson 9

Key Text eBook

Information Security Management Handbook, Volume 5

by Nozaki, M. and Tipton, H.
Key Text eBook

Security strategy: From requirements to reality

by Stackpole, B. and Oksendahl, E.
Essential Resource Website

Incident management

by National Cyber Security Centre
Wider Reading Other

Computer Security Incident Handling Guide

by Cichonski, P. R.
Wider Reading Other

Incident Response Recommendations and…

by Nelson, A. et al.
Wider Reading Article

Incident-centered information security: Managing…

by Baskerville, R. et al.
Wider Reading Article

Community-based collaborative information system…

by Li, J. et al.
Wider Reading eBook

Security in Computing

by Pfleeger, C. et al.
Wider Reading Other

The Importance of Security Awareness Training

by Brodie, C.

Lesson 10

Key Text eBook

Security strategy: From requirements to reality

by Stackpole, B. and Oksendahl, E.
Essential Resource Article

Current trends in Smart City initiatives: Some…

by Neirotti, P. et al.
Essential Resource Article

Recent advances and trends in predictive…

by Lee, J. et al.
Wider Reading Article

A new methodology for security evaluation in…

by Ristov, S. et al.
Wider Reading Article

The Price of Free: Privacy Leakage in…

by Meng, W. et al.
Wider Reading eBook

Information Systems, E-learning, and Knowledge…

by Lytras, M. D. et al.
Wider Reading Website

Former Facebook Workers: We Routinely Suppressed…

by Nunez, M.
Wider Reading Article

Security risk assessment framework for cloud…

by Albakri, S. H. et al.
Wider Reading Article

A survey on IT-governance aspects of cloud…

by Petruch, K. et al.
Wider Reading Other

2017 Trends Security Held Ransom

by Cobb et al.

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Help
  • Feedback To Win

Footer3

  • About Arden University
  • Accessibility Statement
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2026 Arden University  | All rights reserved