1-14 of 14 Books

CISSP for dummies
By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

The new school of information security
By Adam Shostack,Andrew Steward

Enterprise directory and security implementation guide
By Charles Carrington,Tim Speed,Juanita Ellis,Steffano Korper
Breaking into information security
Breaking into information security
By Josh More

Enterprise directory and security implementation guide
By Charles Carrington
Enhancing computer security
Enhancing computer security
By United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology.
Electronic, acoustic, and optical surveillance and monitoring systems
Electronic, acoustic, and optical surveillance and monitoring systems
By Chima Okereke
Federal computer security market, 1992-1997
Federal computer security market, 1992-1997
By INPUT (Firm)
Security products
Security products
By Mary F. Welch,Tonia Ferrell,Diana E. Kole,Margaret K. Strekal
Internet security technologies for the changing e-economy
Internet security technologies for the changing e-economy
By Tom Franklin
Zi xun an quan fa zhan qu shi yu wo guo ke neng shang ji yan jiu
Zi xun an quan fa zhan qu shi yu wo guo ke neng shang ji yan jiu
By Yizhi Wang
Quan qiu zi an shi chang ji wo guo zi an chan ye fa zhan ji hui fen xi =
Quan qiu zi an shi chang ji wo guo zi an chan ye fa zhan ji hui fen xi =
By Yizhi Wang