Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Business Management
      • Computing
      • Criminal Justice
      • Design and creativity
      • Digital Education in Practice
      • Finance and Accounting
      • Health and Care Management
      • Human Resource Management
      • Hospitality and Tourism
      • Investigation, Security and Defence
      • Law
      • Marketing
      • Psychology
      • Supply Chain Management and Logistics
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place

Help

COM7012

Information Security Management

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

NVD - NVD Dashboard

by National Institute of Standards and Technology (NIST)
Essential Resource Website

CISSP - Certified Information Systems Security…

by ISC²
Essential Resource Website

CASP+ CompTIA Advanced Security Practitioner

by CompTIA
Essential Resource Website

CISA Certification | Certified Information…

by ISACA
Essential Resource Website

CISM Certification | Certified Information…

by ISACA
Wider Reading Website

Gartner Forecasts Global Information Security…

by Gartner
Wider Reading Website

NVD - CVSS v3 Calculator

by NIST National Vulnerability Database
Wider Reading Other

CSA Security Guidance for Cloud Computing | CSA

by Cloud Security Alliance (CSA)
Wider Reading Website

Arden Futures

by Arden University Careers

Lesson 2

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

NIST Risk Management Framework

by National Institute of Standards and Technology (NIST)
Essential Resource Other

Threat Actor Type Inference and Characterization…

by Mavroeidis, V., Hohimer, R., Casey, T., & Jøsang, A.
Wider Reading Other

SP 800-30 Rev. 1 Guide for Conducting Risk…

by Joint Task Force Transformation Initiative
Wider Reading Website

ISO/IEC 27000 family — Information security…

by ISO
Wider Reading Other

Special Publication (NIST SP) - 800-39 Managing…

by Ross, R. S.
Wider Reading Other

Risk Management Framework for Information Systems…

by Ross, R. S.

Lesson 3

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

How the Information Governance Reference Model (…

by EDRM
Essential Resource Article

Ethical Obligations to Protect Client Data when…

by Linna, D. W., Jr., and Muchman, W. J.
Wider Reading Website

The TOGAF® Standard, a Standard of The Open Group

by The Open Group Library
Wider Reading Website

What is IT Infrastructure Library (ITIL)?

by Susnjara, S. and Smalley, I.
Wider Reading Website

ISC2 Code of Ethics

by ISC²
Wider Reading Website

ISO/IEC 27000 family — Information security…

by ISO
Wider Reading Website

ISO/IEC 38500:2024

by ISO
Wider Reading Website

COBIT | Control Objectives for Information…

by ISACA
Wider Reading Website

Data Ethics Framework - GOV.UK

by Government Digital Service and Central Digital and Data Office
Wider Reading Legislation

Data Protection Act 2018

Wider Reading Website

General Data Protection Regulation (GDPR) – Legal…

by Intersoft Consulting

Lesson 4

Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Essential Resource Website

Cybersecurity Framework

by National Institute of Standards and Technology (NIST)
Essential Resource Website

Privacy Framework | NIST

by National Institute of Standards and Technology (NIST)
Essential Resource Website

Guide to accountability and governance | ICO

by Information Commissioners Office
Wider Reading Legislation

Copyright, Designs and Patents Act 1988

Wider Reading Website

Informative References: What are they, and how…

by National Institute of Standards and Technology (NIST)
Wider Reading Website

Document Library

by PCI Security Standards Council
Wider Reading Website

ISO/IEC 27001:2022(en)

by ISO
Wider Reading Website

FIPS (standards)

by NIST Computer Security Resource Centre
Wider Reading Legislation

The Network and Information Systems Regulations…

Wider Reading Legislation

Data Protection Act 2018

Wider Reading Legislation

The Privacy and Electronic Communications (EC…

Wider Reading Website

General Data Protection Regulation (GDPR) – Legal…

by Intersoft Consulting
Wider Reading Legislation

Federal Information Security Management Act of…

Wider Reading Legislation

Computer Misuse Act 1990

Wider Reading Legislation

Fraud Act 2006

Wider Reading Legislation

Health Insurance Portability and Accountability…

Wider Reading Legislation

Personal Information Protection and Electronic…

Wider Reading Legislation

Communications Act 2003

Wider Reading Legislation

Sarbanes-Oxley Act of 2002

Wider Reading Other

NIST SP 800-53 Rev. 5 - Security and Privacy…

by Joint Task Force
Wider Reading eBook

Security Risk Assessment Handbook

by Landoll, D. J.

Lesson 5

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Article

BBAC: Behavior-based access control to detect…

by Rikhtechi, L., Rafeh, V., and Rezakhani, A.
Essential Resource Website

CSF 1.1 Archive | NIST

by National Institute of Standards and Technology (NIST)
Essential Resource Website

Examples of Framework Profiles | NIST

by National Institute of Standards and Technology (NIST)

Lesson 6

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

Asset management

by National Cyber Security Centre
Essential Resource Website

SHA-2 Hash Generator Online Tool

by Code Beautify
Essential Resource Website

Image Steganography

by Stanley, J.
Essential Resource Website

Secure website certificate | Firefox Help

by Mozilla Support
Wider Reading Website

CSF 1.1 Archive

by National Institute of Standards and Technology (NIST)
Wider Reading Website

FIPS (standards)

by NIST Computer Security Resource Centre

Lesson 7

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Wider Reading Website

Protect | NIST

by National Institute of Standards and Technology (NIST)
Wider Reading Website

CSF 1.1 Archive

by National Institute of Standards and Technology (NIST)
Wider Reading Website

Password policy: updating your approach

by National Cyber Security Centre
Wider Reading Website

OWASP Top Ten

by OWASP Foundation

Lesson 8

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

Small Business Guide: Response & Recovery

by National Cyber Security Centre
Essential Resource Other

How prepared are you? Business Continuity…

by HM Government
Wider Reading Website

incident - Glossary | CSRC

by National Institute of Standards and Technology (NIST)
Wider Reading Website

Cybersecurity Framework | NIST

by National Institute of Standards and Technology (NIST)
Wider Reading Other

NIST SP 800-61 Rev. 3

by Nelson, A. et al.

Lesson 9

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

Azure Security | Microsoft Azure

by Microsoft
Essential Resource Website

The cloud security principles

by National Cyber Security Centre
Essential Resource Website

7 top cloud security threats — and how to address…

by Edwards, J.
Essential Resource Website

The Weak Link: Recent Supply Chain Attacks…

by Gihon, S.
Essential Resource Website

Cloud Security – Amazon Web Services (AWS)

by Amazon Web Services
Wider Reading Website

The NIST Definition of Cloud Computing:…

by Mell, P., and Grance, T.
Wider Reading Website

Supply chain security guidance

by National Cyber Security Centre (NCSC)
Wider Reading Website

The principles of supply chain security

by National Cyber Security Centre

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University logo 

© 2005-2025 Arden University  | All rights reserved