Can't be ordered Readings and cases in the management of information security Whitman, m.e., mattord, h.j.
Can't be ordered Security monitoring - proven methods for incident detection on enterprise networks Fry, C., Nystrom, M.
Can't be ordered Mastering Data Warehouse Design: Relational and Dimensional Techniques Imhoff, Claudia Galemmo, Nicholas Geiger, Jonathan G.
Can't be ordered Information security architecture an integrated approach to security in the organization Tudor, j.k.
Can't be ordered The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Stuttard, Dafydd
Can't be ordered Information Security Policies, Procedures and Standards: Guidelines for Effective Information Security Management Peltier, Thomas R.
Can't be ordered 24 deadly sins of software security - Programming flaws and how to fix them Howard, M.