Information Security Books
The Complete Auerbach Catalog
The complete Auerbach Online Catalog features titles
Offering the information you need to secure your information, systems, and sites, this online library contains the work of seasoned experts who discuss preferred software packages and models, as well as give step-by-step advice on how to maximize talent, processes, and resources to produce a positive bottom line.
Information Security Books from Auerbach
|The Executive MBA in Information Security||Information Security Management Handbook, 2009 CD-ROM Edition||Building an Enterprise-Wide Business Continuity Program||Data Protection: Governance, Risk Management, and Compliance||Security of Mobile Communications|
|Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats||Understanding and Applying Cryptography and Data Security||Information Security Management Handbook, Sixth Edition, Volume 3||Cyber Fraud: Tactics, Techniques and Procedures||Security in RFID and Sensor Networks|
|Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement||HOWTO Secure and Audit Oracle 10g and 11g||Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies||Architecting Secure Software Systems||Intelligent Network Video: Understanding Modern Video Surveillance Systems|
|Architecting Secure Software Systems||Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking||CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives||Business Resumption Planning, Second Edition||How to Complete a Risk Assessment in 5 Days or Less|
|Information Technology Control and Audit, Third Edition||IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement||Security Software Development: Assessing and Managing Security Risks||Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies||Multimedia Content Encryption: Techniques and Applications|
|Security in Wireless Mesh Networks||Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet||Information Assurance Architecture||Building an Effective Information Security Policy Architecture||Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Second Edition|
|Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition||Information Security Management Handbook, Sixth Edition, Volume 2||Digital Privacy: Theory, Technologies, and Practices||Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition||Software Deployment, Updating, and Patching|
|Data-driven Block Ciphers for Fast Telecommunication Systems||Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks||How to Achieve 27001 Certification: An Example of Applied Compliance Management||Mechanics of User Identification and Authentication: Fundamentals of Identity Management||Testing Code Security|
|The Practical Guide to HIPAA Privacy and Security Compliance||Official (ISC)2 Guide to the SSCP CBK||Security in Distributed, Grid, Mobile, and Pervasive Computing||Computer Forensics: Evidence Collection and Management||Wireless Crime and Forensic Investigation|
|Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI||802.1X Port-Based Authentication||Complete Guide to CISM Certification||Official (ISC)2 Guide to the CISSP CBK||IT Security Governance Guidebook with Security Program Metrics on CD-ROM|
|Practical Hacking Techniques and Countermeasures||Information Security Cost Management||Security in Sensor Networks||Information Security: Design, Implementation, Measurement, and Compliance||The Complete Guide for CPP Examination Preparation|
|Securing Converged IP Networks||Multimedia Encryption and Authentication Techniques and Applications||Multimedia Watermarking Techniques and Applications||Audit and Trace Log Management: Consolidation and Analysis||The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments|
|Wireless Security Handbook||Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK||The Ethical Hack: A Framework for Business Value Penetration Testing||Enhancing Computer Security with Smart Technology||Guide to Optimal Operational Risk and BASEL II|
|Official (ISC)2 Guide to the CISSP-ISSEP CBK||The CISO Handbook: A Practical Guide to Securing Your Company||Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition||CISO Leadership: Essential Principles for Success||Database and Applications Security: Integrating Information Security and Data Management|
|Managing an Information Security and Privacy Awareness and Training Program||Assessing and Managing Security Risk in IT Systems: A Structured Methodology||Curing the Patch Management Headache||Cyber Crime Investigator's Field Guide, Second Edition||A Practical Guide to Security Assessments|
Certain names and logos on this page and others may constitute
trademarks, servicemarks, or tradenames of Taylor & Francis LLC.
Copyright © 20082009 Taylor & Francis LLC. All rights reserved.