Title: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, Author: Eric Cole
Title: Cyber Security Awareness for Accountants and CPAs, Author: Henry Dalziel
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: Henry Dalziel
Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: Digital Identity Management: Technological, Business and Social Implications, Author: David Birch
Title: Enterprise Security: A Data-Centric Approach to Securing the Enterprise, Author: Aaron Woody
Title: Identity and Data Security for Web Development: Best Practices, Author: Jonathan LeBlanc
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft: Protecting the Enterprise from Sabotage, Spying, and Theft, Author: Eric Cole
Title: Internet Security: A Jumpstart for Systems Administrators and IT Managers, Author: Tim Speed
Title: iPad & iPhone Administrator's Guide: Enterprise Deployment Strategies and Security Solutions, Author: Guy Hart-Davis
Title: Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals, Author: Constantine Photopoulos
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: Nmap in the Enterprise: Your Guide to Network Scanning, Author: Angela Orebaugh
Title: SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices, Author: Joey Hirao
Title: Securing Citrix XenApp Server in the Enterprise, Author: Tariq Azad
Title: Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization, Author: Aaron Tiensivu
Title: Security Convergence: Managing Enterprise Security Risk, Author: Dave Tyson
Title: Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts, Author: Derrick Rountree

Pagination Links