Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Wrightson, Tyler December 15, 2014
The Automation Advantage: Embrace the Future of Productivity and Improve Speed, Quality, and Customer Experience Through AI Ghosh, Bhaskar , Prasad, Rajendra , Pallail, Gayathri December 7, 2021
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition Gregory, Peter H. October 28, 2016
CompTIA IT Fundamentals All-in-One Exam Guide (Exam FC0-U51) Jernigan, Scott , Meyers, Mike December 22, 2016
The Digital Economy ANNIVERSARY EDITION: Rethinking Promise and Peril in the Age of Networked Intelligence Tapscott , Don October 31, 2014
Green Supply Chain Management: Product Life Cycle ApproachHsiao-Fan Wang, Surendra M. GuptaJuly 27, 2011
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition Messier, Ric August 2, 2019
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second EditionMark Collier, David EndlerDecember 16, 2013
Innovation the Cleveland Clinic Way: Powering Transformation by Putting Ideas to Work Graham, Thomas January 8, 2016
IT Auditing Using Controls to Protect Information Assets, 2nd EditionChris Davis, Mike Schiller, Kevin WheelerJanuary 10, 2011
IT Security Metrics: A Practical Framework for Measuring Security & Protecting DataLance HaydenJune 21, 2010
IT's About Patient Care: Transforming Healthcare Information Technology the Cleveland Clinic Way Harris, C. Martin , Lazuta, Gene October 19, 2016
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left BehindCharles BabcockApril 16, 2010
The New Age of Innovation: Driving Co-created Value Through Global Networks Prahalad, C.K. Krishnan, M.S. May 4, 2008
The New IT: How Technology Leaders are Enabling Business Strategy in the Digital Age Dyche, Jill January 26, 2015