Computer Rules: A Guide to Formulating Computer Operating and Security Policy for Users
Computers Under Attack: Intruders, Worms, and Viruses
Corporate Espionage: What It Is, Why It's Happening In Your Company, What You Must Do About It
Disaster Recovery Planning: Strategies for Protecting Critical Information Assets 2nd Ed.
E-Delegering: Roller och Rättigheter
Effective Security Management 3rd Ed.
Fighting Computer Crime: A New Framework for Protecting Information
IT Insecurity: A Multi-disciplinary Inquiry
Incident Response & Computer Forensics 2nd Ed.
Information Security: Policies and Procedures
Information Security: Protecting the Global Enterprise
Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Management Handbook: Volume 2 4th Ed.
Information Security Management Handbook 4th Ed.
Information Systems Security: A Practitioner's Reference
Information Warfare: How to Survive Cyber Attacks
Information Warfare and Security
Inside the Security Mind: Making the Tough Decisions
Loss Prevention and Security Procedures: Practical Applications for Contemporary Problems