Building Bluetooth low energy systems : take your first steps in IoT /
Information security best practices : 200 basic rules /
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /
Wireless communications and networking /
Advances in cyber security : technology, operations, and experiences /
Security : the Human Factor.
Security testing handbook for banking applications /
Once More Unto the Breach : Mangaging Information Security in an Uncertain World.
Spring Security.
Securing cloud services : a pragmatic approach to security architecture in the cloud /
Network and system security /
Security and control in information systems : a guide for business and accounting /
CyberWar, CyberTerror, CyberCrime.
Securing the cloud : cloud computer security techniques and tactics /
Hack proofing your wireless network /
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud /
Information security risk management for ISO27001/ISO27002 /
Once more unto the breach : managing information security in an uncertain world /
Document Security : Protecting Physical and Electronic Content.
Bluetooth security /