Security Information and Event Management (SIEM) ImplementationDavid Miller, Shon Harris, Allen Harper, Stephen VanDyke, Chris BlaskOctober 25, 2010
IT Auditing Using Controls to Protect Information Assets, 2nd EditionChris Davis, Mike Schiller, Kevin WheelerJanuary 10, 2011
Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionAllen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron WilliamsJanuary 6, 2011
Securing the Clicks Network Security in the Age of Social MediaGary Bahadur, Jason Inasi, Alex de CarvalhoOctober 10, 2011
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second EditionMark Collier, David EndlerDecember 16, 2013
Hacking Exposed Mobile Security Secrets & SolutionsNeil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike PriceJuly 9, 2013
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Wrightson, Tyler December 15, 2014