انتشارات Isaca
![CGEIT Review Manual 2010](http://cdn.ketabkoo.com/covers/1/195294-n.jpg)
CGEIT Review Manual 2010
Isaca, 2010![CISA Review Manual 2010](http://cdn.ketabkoo.com/covers/1/195296-n.jpg)
CISA Review Manual 2010
Isaca, 2009![CISA Review Manual 2011](http://cdn.ketabkoo.com/covers/1/195297-n.jpg)
CISA Review Manual 2011
Isaca, 2010![Cobit 4.1](http://cdn.ketabkoo.com/covers/1/195302-n.jpg)
Cobit 4.1
IT Governance Institute, 2007![COBIT 5: Enabling Information](http://cdn.ketabkoo.com/covers/1/195306-n.jpg)
COBIT 5: Enabling Information
Isaca, 2013![COBIT 5: Enabling Processes](http://cdn.ketabkoo.com/covers/1/195307-n.jpg)
COBIT 5: Enabling Processes
Isaca, 2012![Transforming Cybersecurity: Using COBIT 5](http://cdn.ketabkoo.com/covers/2/267606-n.jpg)
Transforming Cybersecurity: Using COBIT 5
Isaca, 2013![COBIT 5 Implementation](http://cdn.ketabkoo.com/covers/10/1072672-n.jpg)
COBIT 5 Implementation
ISACA, 2012![CISM Review Manual 2013](http://cdn.ketabkoo.com/covers/11/1177604-n.jpg)
CISM Review Manual 2013
ISACA, 2013![CISM Review Manual 2014](http://cdn.ketabkoo.com/covers/11/1177605-n.jpg)
CISM Review Manual 2014
ISACA, 2014![CISA Review Manual, 27th Edition](http://cdn.ketabkoo.com/covers/12/1290885-n.jpg)
CISA Review Manual, 27th Edition
ISACA, 2019![CSX Cybersecurity Fundamentals Study Guide](http://cdn.ketabkoo.com/covers/13/1327929-n.jpg)
CSX Cybersecurity Fundamentals Study Guide
ISACA, 2015![Implementing the NIST Cybersecurity Framework](http://cdn.ketabkoo.com/covers/13/1328036-n.jpg)