Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World
Securing your mobile data requires the proper balance between security, user acceptance, technology capabilities, and resource commitment. Supplying real-life examples and authoritative guidance, this complete resource walks you through the process of creating an effective mobile security program and provides the understanding required to develop a customized approach to securing your information.

Information Security Management Handbook
Contributed to the 2001, 2004, 2005, and 2006 editions. 
Chapter topics include Phishing, Off-shore Development Risks, Email Retention. Biometric Security, and Penetration Testing.

Official (ISC)2 Guide to the CISSP CBK, Second Edition, 2009
Revised the “Access Control” chapter.

Certified Information Security Manager (CISM) Review Manual, 2009
Contributed to the CISM study guide.