Asset Protection and Security Management Handbook
POA Publishing
ISBN: 0-8493-1603-0
Building a Global Information Assurance Program
Raymond J.Curts and Douglas E.Campbell
ISBN: 0-8493-1368-6
Building an Information Security Awareness Program
Mark B.Desman
ISBN: 0-8493-0116-5
Critical Incident Management
Alan B.Sterneckert
ISBN: 0-8493-0010-X
Cyber Crime Investigator’s Field Guide
Bruce Middleton
ISBN: 0-8493-1192-6
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving
Evidence of Computer Crimes
Albert J.Marcella, Jr. and Robert S.Greenfield
ISBN: 0-8493-0955-7
The Ethical Hack: A Framework for Business Value Penetration Testing
James S.Tiller
ISBN: 0-8493-1609-X
The Hacker’s Handbook: The Strategy Behind Breaking into and Defending
Networks
Susan Young and Dave Aitel
ISBN: 0-8493-0888-7
Information Security Architecture: An Integrated Approach to Security in the
Organization
Jan Killmeyer Tudor
ISBN: 0-8493-9988-2
Information Security Fundamentals
Thomas R.Peltier
ISBN: 0-8493-1957-9
Information Security Management Handbook, 5th Edition
Harold F.Tipton and Micki Krause
ISBN: 0-8493-1997-8
Information Security Policies, Procedures, and Standards: Guidelines for Effective
Information Security Management
Thomas R.Peltier
ISBN: 0-8493-1137-3
Information Security Risk Analysis
Thomas R.Peltier
ISBN: 0-8493-0880-1
Information Technology Control and Audit
Fredrick Gallegos, Daniel Manson,
and Sandra Allen-Senft
ISBN: 0-8493-9994-7
Investigator’s Guide to Steganography
Gregory Kipper
0-8493-2433-5
Managing a Network Vulnerability Assessment
Thomas Peltier, Justin Peltier, and John A.Blackley
ISBN: 0-8493-1270-1
Network Perimeter Security: Building Defense In-Depth
Cliff Riggs
ISBN: 0-8493-1628-6
The Practical Guide to HIPAA Privacy and Security Compliance
Kevin Beaver and Rebecca Herold
ISBN: 0-8493-1953-6
A Practical Guide to Security Engineering and Information Assurance
Debra S.Herrmann
ISBN: 0-8493-1163-2
The Privacy Papers: Managing Technology, Consumer, Employee and Legislative
Actions
Rebecca Herold
ISBN: 0-8493-1248-5
Public Key Infrastructure: Building Trusted Applications and Web Services
John R.Vacca
ISBN: 0-8493-0822-4
Securing and Controlling Cisco Routers
Peter T.Davis
ISBN: 0-8493-1290-6
Strategic Information Security
John Wylder
ISBN: 0-8493-2041-0
Surviving Security: How to Integrate People, Process, and Technology, Second
Edition
Amanda Andress
ISBN: 0-8493-2042-9
A Technical Guide to IPSec Virtual Private Networks
James S.Tiller
ISBN: 0-8493-0876-3
Using the Common Criteria for IT Security Evaluation
Debra S.Herrmann
ISBN: 0-8493-1404-6
AUERBACH PUBLICATIONS
http://www.auerbach-publications.com/
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: [email protected]
18.226.165.70