COMPUTER SECURITY: A HANDS-ON APPROACH
Du, W. (2019). Computer security (2nd ed., pp. https://www.amazon.com/Computer-Security-Hands-Approach-Wenliang/dp/1733003908/ref=sr_1_2?crid=3MJUEOUOV8JUZ&keywords=9781733003902&qid=1653342282&s=books&sprefix=9781733003902%2Cstripbooks%2C90&sr=1-2).
COMPUTER SECURITY HANDBOOK
Bosworth, S., Kabay, M., & Whyne, E. (2014). Computer security handbook (1st ed., pp. https://www.amazon.com/Computer-Security-Handbook/dp/1118134109/ref=sr_1_1?crid=3OAG0NDRVNWY4&keywords=9781118134108&qid=1653338982&sprefix=9781118134108%2Caps%2C57&sr=8-1).
Bosworth, S., Kabay, M., & Whyne, E. (2014). Computer security handbook (2nd ed., pp. https://www.amazon.com/Computer-Security-Handbook-Seymour-Bosworth/dp/1118134117/ref=sr_1_1?crid=1G01HXVH6P9ZO&keywords=9781118134115&qid=1653340521&sprefix=9781118134115%2Caps%2C73&sr=8-1).
CRYPTOGRAPHY ENGINEERING: DESIGN PRINCIPLES AND PRACTICAL APPLICATIONS
Kohno., T., Schneier., B., & Ferguson., N. (2010). Cryptography Engineering: Design Principles and Practical Applications (1st ed., pp. https://www.amazon.com/Cryptography-Engineering-Principles-Practical-Applications/dp/0470474246/ref=sr_1_1?crid=116YY89LPAPWC&keywords=978-0470474242&qid=1653341916&s=books&sprefix=978-0470474242%2Cstripbooks%2C124&sr=1-1).
CYBERSECURITY FOR EXECUTIVES
Touhill, G., & Touhill, C. (2014). Cybersecurity for executives (1st ed., pp. https://www.amazon.com/Cybersecurity-Executives-Practical-Gregory-Touhill/dp/1118888146/ref=sr_1_1?crid=2XIBA0VQ192JB&keywords=9781118888148&qid=1653338789&sprefix=9781118888148%2Caps%2C82&sr=8-1).
ENGINEERING SAFE AND SECURE SOFTWARE SYSTEMS
Warren Axelrod, C. (2012). ISBN 9781608074723 - Engineering Safe and Secure Software Systems Direct Textbook. Retrieved 23 May 2022, from https://www.amazon.com/Engineering-Software-Systems-Information-Security-dp-1608074722/dp/1608074722/ref=mt_other?_encoding=UTF8&me=&qid=1653341664.
INFORMATION GOVERNANCE AND SECURITY
Iannarelli, J., & O'Shaughnessy, M. (2015). Information governance and security (pp. https://www.amazon.com/Information-Governance-Security-Protecting-Proprietary/dp/0128002476/ref=sr_1_1?crid=869EXXMGR51C&keywords=9780128002476&qid=1653340697&sprefix=9780128002476%2Caps%2C49&sr=8-1).
INTRODUCTION TO INTELLIGENCE STUDIES
Jensen, C., McElreath, D., & Graves, M. (2017). Introduction to intelligence studies (2nd ed., pp. https://www.amazon.com/Introduction-Intelligence-Studies-Carl-Jensen/dp/1498738346/ref=sr_1_1?crid=1803T58QN3GRO&keywords=INTELLIGENCE+STUDIES&qid=1653341263&sprefix=intelligence+studies%2Caps%2C82&sr=8-1).
PRACTICAL CYBERSECURITY ARCHITECTURE: A GUIDE TO CREATING AND IMPLEMENTING ROBUST DESIGNS FOR CYBERSECURITY ARCHITECTS
Kelley, D., & Moyle, E. (2020). Practical Cybersecurity Architecture (pp. https://www.amazon.com/Practical-Cybersecurity-Architecture-implementing-cybersecurity/dp/1838989927/ref=sr_1_3?crid=1NBUJIL3XMSE3&keywords=9781838989927&qid=1653342587&s=books&sprefix=9781838989927%2Cstripbooks%2C98&sr=1-3)
SECURITY POLICIES AND IMPLEMENTATION ISSUES
Johnson, R. (2015). Security Policies and Implementation Issues, 2nd Edition (2nd ed., pp. https://www.amazon.com/Security-Policies-Implementation-Information-Assurance/dp/128405599X/ref=sr_1_1?crid=2V4GCYQX2ZAFG&keywords=9781284055993&qid=1653340868&sprefix=9781284055993%2Caps%2C78&sr=8-1).
Du, W. (2019). Computer security (2nd ed., pp. https://www.amazon.com/Computer-Security-Hands-Approach-Wenliang/dp/1733003908/ref=sr_1_2?crid=3MJUEOUOV8JUZ&keywords=9781733003902&qid=1653342282&s=books&sprefix=9781733003902%2Cstripbooks%2C90&sr=1-2).
COMPUTER SECURITY HANDBOOK
Bosworth, S., Kabay, M., & Whyne, E. (2014). Computer security handbook (1st ed., pp. https://www.amazon.com/Computer-Security-Handbook/dp/1118134109/ref=sr_1_1?crid=3OAG0NDRVNWY4&keywords=9781118134108&qid=1653338982&sprefix=9781118134108%2Caps%2C57&sr=8-1).
Bosworth, S., Kabay, M., & Whyne, E. (2014). Computer security handbook (2nd ed., pp. https://www.amazon.com/Computer-Security-Handbook-Seymour-Bosworth/dp/1118134117/ref=sr_1_1?crid=1G01HXVH6P9ZO&keywords=9781118134115&qid=1653340521&sprefix=9781118134115%2Caps%2C73&sr=8-1).
CRYPTOGRAPHY ENGINEERING: DESIGN PRINCIPLES AND PRACTICAL APPLICATIONS
Kohno., T., Schneier., B., & Ferguson., N. (2010). Cryptography Engineering: Design Principles and Practical Applications (1st ed., pp. https://www.amazon.com/Cryptography-Engineering-Principles-Practical-Applications/dp/0470474246/ref=sr_1_1?crid=116YY89LPAPWC&keywords=978-0470474242&qid=1653341916&s=books&sprefix=978-0470474242%2Cstripbooks%2C124&sr=1-1).
CYBERSECURITY FOR EXECUTIVES
Touhill, G., & Touhill, C. (2014). Cybersecurity for executives (1st ed., pp. https://www.amazon.com/Cybersecurity-Executives-Practical-Gregory-Touhill/dp/1118888146/ref=sr_1_1?crid=2XIBA0VQ192JB&keywords=9781118888148&qid=1653338789&sprefix=9781118888148%2Caps%2C82&sr=8-1).
ENGINEERING SAFE AND SECURE SOFTWARE SYSTEMS
Warren Axelrod, C. (2012). ISBN 9781608074723 - Engineering Safe and Secure Software Systems Direct Textbook. Retrieved 23 May 2022, from https://www.amazon.com/Engineering-Software-Systems-Information-Security-dp-1608074722/dp/1608074722/ref=mt_other?_encoding=UTF8&me=&qid=1653341664.
INFORMATION GOVERNANCE AND SECURITY
Iannarelli, J., & O'Shaughnessy, M. (2015). Information governance and security (pp. https://www.amazon.com/Information-Governance-Security-Protecting-Proprietary/dp/0128002476/ref=sr_1_1?crid=869EXXMGR51C&keywords=9780128002476&qid=1653340697&sprefix=9780128002476%2Caps%2C49&sr=8-1).
INTRODUCTION TO INTELLIGENCE STUDIES
Jensen, C., McElreath, D., & Graves, M. (2017). Introduction to intelligence studies (2nd ed., pp. https://www.amazon.com/Introduction-Intelligence-Studies-Carl-Jensen/dp/1498738346/ref=sr_1_1?crid=1803T58QN3GRO&keywords=INTELLIGENCE+STUDIES&qid=1653341263&sprefix=intelligence+studies%2Caps%2C82&sr=8-1).
PRACTICAL CYBERSECURITY ARCHITECTURE: A GUIDE TO CREATING AND IMPLEMENTING ROBUST DESIGNS FOR CYBERSECURITY ARCHITECTS
Kelley, D., & Moyle, E. (2020). Practical Cybersecurity Architecture (pp. https://www.amazon.com/Practical-Cybersecurity-Architecture-implementing-cybersecurity/dp/1838989927/ref=sr_1_3?crid=1NBUJIL3XMSE3&keywords=9781838989927&qid=1653342587&s=books&sprefix=9781838989927%2Cstripbooks%2C98&sr=1-3)
SECURITY POLICIES AND IMPLEMENTATION ISSUES
Johnson, R. (2015). Security Policies and Implementation Issues, 2nd Edition (2nd ed., pp. https://www.amazon.com/Security-Policies-Implementation-Information-Assurance/dp/128405599X/ref=sr_1_1?crid=2V4GCYQX2ZAFG&keywords=9781284055993&qid=1653340868&sprefix=9781284055993%2Caps%2C78&sr=8-1).