SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
Coach Women's Medium Zip Around Accessory-Travel Wallet, B4/Chalk
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
Sarbanes-Oxley IT Compliance Using Open Source Tools
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cryptography for Developers
Video Conferencing over IP: Configure, Secure, and Troubleshoot
Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series)