انتشارات Syngress Publishing
Building Robots with LEGO Mindstorms
Mario Ferrari, Giulio Ferrari, Ralph Hempel, 2002
Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors
Anthony Reyes, Richard Brittson, Kevin O'Shea, James Steele, 2007
Alternate Data Storage Forensics
Amber Schroader, Tyler Cohen, 2007
Cryptography for Developers
Tom St Denis, 2007
Configuring and troubleshooting Windows XP Professional
Brian Barber; Martin Grasdal, 2001
Building Robots with LEGO Mindstorms NXT
Ferrari, Mario; Ferrari, Giulio; Hempel, Ralph, 2002
Smart Grid Security. Innovative Solutions for a Modernized Grid
Florian Skopik, Paul Dr. Smith, 2015
Hardware Hacking: Have Fun While Voiding Your Warranty
Joe Grand, Ryan Russell, Kevin Mitnick, 2004
Hardware Hacking: Have Fun While Voiding Your Warranty
Joe Grand, Ryan Russell, Kevin Mitnick, 2004
The Mezonic Agenda: Hacking the Presidency
Thompson H.H., Nomikos S., 2004
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
A Study of Black Hole Attack Solutions. On AODV Routing Protocol in MANET
Elahe Fazeldehkordi, I.S. Amiri, Oluwatobi Ayodeji Akanbi, 2015
InfoSecurity 2008 Threat Analysis
Craig Schiller, 2008
CYA: Securing Exchange Server 2003 & Outlook Web Access
Walther H., 2004
Configuring SonicWALL firewalls
Chris Lathem, 2006
ASP Configuration Handbook
Palmatier G., 2001
Netcat Power Tools
Jan Kanclirz, 2008
Dr. Tom Shinder's ISA Server and Beyond. Real World Security Solutions for Microsoft Enterprise Networks
M.D. Thomas W. Shinder, Debra Littlejohn Shinder, 2003
Programming Lego Mindstorms with Java
Dario Laverde (ed.), 2002
