IT Auditing Using Controls to Protect Information Assets, 2nd EditionChris Davis, Mike Schiller, Kevin WheelerJanuary 10, 2011
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second EditionMark Collier, David EndlerDecember 16, 2013
Successful Business Intelligence: Unlock the Value of BI & Big Data, Second EditionCindi HowsonOctober 15, 2013