Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer, Author: Perry Carpenter
Title: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, Author: Eric Cole
Title: Digital Identity Management: Technological, Business and Social Implications, Author: David Birch
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green
Title: Identity and Data Security for Web Development: Best Practices, Author: Jonathan LeBlanc
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Cyber Security Awareness for Accountants and CPAs, Author: Henry Dalziel
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: Henry Dalziel
Title: Enterprise Security: A Data-Centric Approach to Securing the Enterprise, Author: Aaron Woody
Title: Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts, Author: Derrick Rountree
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Nmap in the Enterprise: Your Guide to Network Scanning, Author: Angela Orebaugh
Title: Thor's Microsoft Security Bible: A Collection of Practical Security Techniques, Author: Timothy
Title: Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals, Author: Constantine Photopoulos
Title: Security Convergence: Managing Enterprise Security Risk, Author: Dave Tyson
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: iPad & iPhone Administrator's Guide: Enterprise Deployment Strategies and Security Solutions, Author: Guy Hart-Davis
Title: SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices, Author: Joey Hirao
Title: Securing Citrix XenApp Server in the Enterprise, Author: Tariq Azad

Pagination Links