
Author by:
Muema Lombe


Audit and Accounting Guide: Investment Companies

Audit Risk Alert: General Accounting and Auditing Developments

Audit and Accounting Guide: Health Care Entities, 2018

Security Risk Assessment: Managing Physical and Operational Security

Auditing & Assurance Services

Hacking with Kali Linux: The Complete Guide to Kali Linux and the Art of Exploitation, Basic Security, Wireless Network Security, Ethical Hacking and Penetration Testing for Beginners

Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

Tech Boss Lady: How to Start-up, Disrupt, and Thrive as a Female Founder
