Public Key Infrastructure: Building Trusted Applications and Web Services John R. The Hacker’s Handbook: The Strategy Behind Breaking into and Defending Networks Susan Young and Dave Aitel ISBN: 0-8493-0888-7 The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions Rebecca Herold ISBN: 0-8493-1248-5 The Ethical Hack: A Framework for Business Value Penetration Testing James S. Blackley ISBN: 0-8493-1270-1 Network Perimeter Security: Building Defense In-Depth Cliff Riggs ISBN: 0-8493-1628-6 The Practical Guide to HIPAA Privacy and Security Compliance Kevin Beaver and Rebecca Herold ISBN: 0-8493-1953-6 A Practical Guide to Security Engineering and Information Assurance Debra S. Managing a Network Vulnerability Assessment Thomas Peltier, Justin Peltier, and John A. Sterneckert ISBN: 0-8493-0010-X Cyber Crime Investigator’s Field Guide Bruce Middleton ISBN: 0-8493-1192-6 Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes Albert J. Desman ISBN: 0-8493-0116-5 Critical Incident Management Alan B. Investigator’s Guide to Steganography Gregory Kipper ISBN: 0-8493-2433-5īuilding an Information Security Awareness Program Mark B. Information Technology Control and Audit Fredrick Gallegos, Daniel Manson, and Sandra Allen-Senft ISBN: 0-8493-9994-7īuilding a Global Information Assurance Program Raymond J. OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Asset Protection and Security Management Handbook POA Publishing ISBN: 0-8493-1603-0 Information Half Title Page Security Architecture Second EditionĪU_sec 6 series 11/18/05 12:55 PM AU1549_C000.fm Page ii Wednesday, 10:37 AM
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |