
Category:
CyberSecurity
CyberSecurity, Risk & Compliance


IT Auditing Using Controls to Protect Information Assets

Cyber Security: Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security

Securing an IT Organization through Governance, Risk Management, and Audit (Internal Audit and IT Audit)

IT Security Risk Control Management: An Audit Preparation Plan

The Manga Guide to Cryptography

Financial Failures and Scandals: From Enron to Carillion

NIST 800-171 Information Technology Security Guidebook

Cloud Security Auditing (Advances in Information Security)
