The New Age of Innovation: Driving Co-created Value Through Global Networks Prahalad, C.K. Krishnan, M.S. May 4, 2008
Green Supply Chain Management: Product Life Cycle ApproachHsiao-Fan Wang, Surendra M. GuptaJuly 27, 2011
Applied SAP BI 7.0 Web Reports: Using BEx Web Analyzer and Web Application DesignerPeter JonesMarch 15, 2010
Security Information and Event Management (SIEM) ImplementationDavid Miller, Shon Harris, Allen Harper, Stephen VanDyke, Chris BlaskOctober 25, 2010
IT Security Metrics: A Practical Framework for Measuring Security & Protecting DataLance HaydenJune 21, 2010
Computing for Seniors QuickStepsMarty Matthews, Carole Matthews, Gary David Bouton, Bobbi SandbergApril 6, 2011
IT Auditing Using Controls to Protect Information Assets, 2nd EditionChris Davis, Mike Schiller, Kevin WheelerJanuary 10, 2011
Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionAllen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron WilliamsJanuary 6, 2011
Securing the Clicks Network Security in the Age of Social MediaGary Bahadur, Jason Inasi, Alex de CarvalhoOctober 10, 2011
How to Deliver a TED Talk: Secrets of the World's Most Inspiring Presentations, revised and expanded new edition, with a foreword by Richard St. John and an afterword by Simon SinekJeremey DonovanSeptember 30, 2013