Actually Useful Internet Security Techniques: Covers SATAN and Spoofing
Computer Rules: A Guide to Formulating Computer Operating and Security Policy for Users
Effective Security Management 3rd Ed.
Information Security: Protecting the Global Enterprise
Information Security: Policies and Procedures
Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Management Handbook: Volume 2 4th Ed.
Information Security Management Handbook 4th Ed.
Information Systems Security: A Practitioner's Reference
Information Warfare and Security
Inside the Security Mind: Making the Tough Decisions
Loss Prevention and Security Procedures: Practical Applications for Contemporary Problems
Managing Information Security Risks: The Octave Approach
Mergers and Acquisitions Security: Corporate Restructuring and Security Management
Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
Model Security Policies, Plans, and Procedures
Network Security: How to Plan for It and Achieve It
Office and Office Building Security 2nd Ed.
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance