Leadership Solutions

IT Security & Information Protection



Model Product Image Item Name Price+
SEC501-T1LS10 Tier 1 Security Leader™ Services

Tier 1 Security Leader™ Services

Security and Risk Solutions : Tier 1 Security Leaders™ typically lead large enterprises with mature programs and are seeking to add business value and contribute to the bottom line. This program is...

Call for Price

... more info
Call for price

SPC001-RWAA05 The Real War Against America

The Real War Against America

The Real War Against America reads like a spy thriller, but it is a true story; author Kingstone tells the account of the company he founded, Super Vision International, and its desperate struggle...
$24.95

... more info

CT002-MIS12 Readings and Cases in the Management of Information Security

Readings and Cases in the Management of Information Security

These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each...
$40.95

Buy Now

CT003-RCIS12 Readings & Cases in Information Security: Law & Ethics

Readings & Cases in Information Security: Law & Ethics

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security...
$43.95

Buy Now

CT007-RIS12 Roadmap to Information Security: For IT and Infosec Managers

Roadmap to Information Security: For IT and Infosec Managers

Roadmap toInformation Security: For IT and INFOSEC Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to...
$44.95

Buy Now

CT011-NDFP12 Network Defense: Fundamentals and Protocols

Network Defense: Fundamentals and Protocols

The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the...
$54.95

Buy Now

CT001-ISLM12 Hands-On Information Security Lab Manual

Hands-On Information Security Lab Manual

The Hands-On Information Security Lab Manual allows users to apply the basics of their introductory security knowledge in a hands-on environment with detailed exercises using Windows 2000, XP and...
$58.95

Buy Now

CT012-NDSV12 Network Defense: Security and Vulnerability Assessment

Network Defense: Security and Vulnerability Assessment

The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the...
$58.95

Buy Now

CT013-PTTT12 Penetration Testing: Network Threat Testing

Penetration Testing: Network Threat Testing

The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this...
$58.95

Buy Now

EL001-PLSC09 Physical and Logical Security Convergence

Physical and Logical Security Convergence

Powered By Enterprise Security Management Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are...
$59.95

... more info

CT010-EHC12 Ethical Hacking & Countermeasures: Threats & Defense Mechanisms

Ethical Hacking & Countermeasures: Threats & Defense Mechanisms

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and...
$64.95

Buy Now

SEC41-CINSP06 The IT Security Response to Misconduct Allegations

The IT Security Response to Misconduct Allegations

Guidelines for Successful Investigations in Organizations Special Edition for IT Professionals This is not another book series directed towards the seasoned or developing security investigator. This...
$71.00

... more info


Copyright © 2019 The Security Executive Council.
The Security Executive Council