Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Securing Citrix XenApp Server in the Enterprise, Author: Tariq Azad
Title: Snort Intrusion Detection 2.0, Author: Syngress
Title: Nmap in the Enterprise: Your Guide to Network Scanning, Author: Angela Orebaugh
Title: SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices, Author: Joey Hirao
Title: The Ethical Hack: A Framework for Business Value Penetration Testing, Author: James S. Tiller
Title: Security Convergence: Managing Enterprise Security Risk, Author: Dave Tyson
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Security Metrics, Author: Andrew Jaquith
Title: Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization, Author: Aaron Tiensivu
Title: Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals, Author: Constantine Photopoulos
Title: Internet Security: A Jumpstart for Systems Administrators and IT Managers, Author: Tim Speed
Title: Thor's Microsoft Security Bible: A Collection of Practical Security Techniques, Author: Timothy
Title: Digital Identity Management: Technological, Business and Social Implications, Author: David Birch