The NCSA Guide to Enterprise Security: Protecting Information Assets
The Next World War: Computers Are the Weapons and the Front Line Is Everywhere
The Process of Network Security: Designing and Managing a Safe Network
The Ultimate Financial Security Survey
Time Based Security: Practical and Provable Methods to Protect Enterprise and Infrastructure, Networks and Nation