Computer forensics and privacy / Michael A. Caloyannides
Writing information security policies / Scott Barman