Publications

Books, articles, and items of literary note in my back catalog.

(ISC)2

Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World

Securing your mobile data requires the proper balance between security, user acceptance, technology capabilities, and resource commitment. Supplying real-life examples and authoritative guidance, this complete resource walks you through the process of creating an effective mobile security program and provides the understanding required to develop a customized approach to securing your information.

Information Security Management Handbook

Contributed to the 2001, 2004, 2005, and 2006 editions.

Chapter topics include Phishing, Off-shore Development Risks, Email Retention. Biometric Security, and Penetration Testing.


Official (ISC)2 Guide to the CISSP CBK, Second Edition, 2009

Revised the “Access Control” chapter.


Certified Information Security Manager (CISM) Review Manual, 2009

Contributed to the CISM study guide.