IT Auditing Using Controls to Protect Information Assets, 2nd EditionChris Davis, Mike Schiller, Kevin WheelerJanuary 10, 2011
Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionAllen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron WilliamsJanuary 6, 2011
Rapid Modernization of Java Applications: Practical Business and Technical Solutions for Upgrading Your Enterprise Portfolio Venkat, G. October 6, 2017
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition Gregory, Peter H. October 28, 2016