IT security risk control management : an audit preparation plan
IT audit : 30 success secrets, 30 most asked questions on IT audit, what you need to know
Cyber Security and Privacy Control
Cyber security and privacy control
IT audit, control and security
Honeypots : tracking hackers
Hackers beware
Auditing information and cyber security governance : a controls based approach
Hacking exposed : network security secrets & solutions
Certified information systems auditor 73 success secrets : 73 most asked questions on certified information systems auditor (What You Need to Know)
Counter hack : a step-by-step guide to computer attacks and effective defenses
CompTIA Security + : study guide
Web hacking : attacks and defense
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business executives
Fundamentals of computer and internet fraud
Hack I. T. : security through penetration testing
Perlindungan privacy : di era new normal digital lifestyle terkait cyber power
Protecting your librarys digital sources : the essential guide to planning and preservation
Hackers delight
The digital rights movement : the role of technology in subverting digital copyright