| title | media type | ISBN-13 | year of publica- tion | other author(s) |
|---|---|---|---|---|
| Adaptive Security Management Architecture | Paperback | 978-0-367-45229-2 | 2019 | |
| Adaptive Security Management Architecture | Hardcover | 978-0-8493-7052-6 | 2010 | |
| A Technical Guide to IPSec Virtual Private Networks | " | 978-1-138-45359-3 | 2017 | |
| A Technical Guide to IPSec Virtual Private Networks | Paperback | 978-0-8493-0876-5 | 2000 | |
| CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits | " | 978-0-367-38200-1 | 2019 | |
| CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits | Hardcover | 978-1-4398-8027-2 | 2011 | |
| Information Security Management Handbook, 2013 CD-ROM Edition | CD-ROM | 978-1-4665-6726-9 | 2013 | Richard O'Hanley |
| Information Security Management Handbook, Volume 7 | Hardcover | 978-1-4665-6749-8 | 2013 | " |
| The Ethical Hack: A Framework for Business Value Penetration Testing | Paperback | 978-0-367-39381-6 | 2019 | |
| The Ethical Hack: A Framework for Business Value Penetration Testing | Hardcover | 978-0-8493-1609-8 | 2004 | |
J. S. · J. T. · James S. · James T. · S. T.