Building an Effective Information Security Policy Architecture OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Port-Based Authentication Information Security Cost Management Edwin Lyle Brown Ioana V. Bazavan and Ian Lim ISBN: 1-4200-4464-8 ISBN: 0-8493-9275-6 Audit and Trace Log Management: Information Security Fundamentals Consolidation and Analysis Thomas R. Peltier, Justin Peltier, and John A. Blackley Phillip Q. Maier ISBN: 0-8493-1957-9 ISBN: 0-8493-2725-3 Information Security Management Handbook, The CISO Handbook: A Practical Guide to Sixth Edition Securing pany Harold F. Tipton and Micki Krause Michael Gentile, Ron Collette and Thomas D. August ISBN: 0-8493-7495-2 ISBN: 0-8493-1952-8 Information Security Risk Analysis, Complete Guide to Security and Privacy Second Edition Metrics: Measuring pliance, Thomas R. Peltier Operational Resilience, and ROI ISBN: 0-8493-3346-6 Debra S. Herrmann ISBN: 0-8493-5402-1 Investigations in the Workplace Eugene F. Ferraro Crisis Management Planning and Execution ISBN: 0-8493-1648-0 Edward S. Devlin ISBN: 0-8493-2244-8 IT Security Governance Guidebook with Security Program Metrics on CD-ROM Computer Forensics: Evidence Collection Fred Cohen and Management ISBN: 0-8493-8435-4 Robert C. Newman ISBN: 0-8493-0561-6 Managing an Information Security and Privacy Awareness and Training Program Curing the Patch Management Headache a Herold Felicia M Nicastro ISBN: 0-8493-2963-9 ISBN: 0-8493-2854-3 Mechanics of User Identification and Cyber Crime Investigator's Field Guide, Authentication: Fundamentals of Identity Second Edition Management Bruce Middleton Dobromir Todorov ISBN: 0-8493-2768-7 ISBN: 1-4200-5219-5 Database and Applications Security: Integrating Practical Hacking Techniques and Information Security and Data Management Countermeasures Bhavani Thuraisingham Mark D. Spivey ISBN: 0-8493-2224-3 ISBN: 0-8493-7057-4 Guide to Optimal Operational Risk and BASEL II Securing Co