title | media type | ISBN-13 | year of publica- tion | other author(s) |
---|---|---|---|---|
Adaptive Security Management Architecture | Paperback | 978-0-367-45229-2 | 2019 | |
Adaptive Security Management Architecture | Hardcover | 978-0-8493-7052-6 | 2010 | |
A Technical Guide to IPSec Virtual Private Networks | " | 978-1-138-45359-3 | 2017 | |
A Technical Guide to IPSec Virtual Private Networks | Paperback | 978-0-8493-0876-5 | 2000 | |
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits | " | 978-0-367-38200-1 | 2019 | |
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits | Hardcover | 978-1-4398-8027-2 | 2011 | |
Information Security Management Handbook, 2013 CD-ROM Edition | CD-ROM | 978-1-4665-6726-9 | 2013 | Richard O'Hanley |
Information Security Management Handbook, Volume 7 | Hardcover | 978-1-4665-6749-8 | 2013 | " |
The Ethical Hack: A Framework for Business Value Penetration Testing | Paperback | 978-0-367-39381-6 | 2019 | |
The Ethical Hack: A Framework for Business Value Penetration Testing | Hardcover | 978-0-8493-1609-8 | 2004 |
J. S. · J. T. · James S. · James T. · S. T.