انتشارات Syngress

Nessus, Snort, and Ethereal Power Tools
Neil Archibald, 2005
Penetration Tester's Open Source Toolkit
Johnny Long, Aaron W. Bayles, James C. Foster, Chris Hurley, Mike Petruzzi, Noam Rathaus, SensePost, 2006
Programming Lego Mindstorms with Java
Dario Laverde, 2002
Programming LEGO MINDSTORMS with Java
Dario Laverde, 2002
Programming Lego Mindstorms with Java (With CD-ROM)
Dario Laverde, 2002
Programming Lego Mindstorms NXT
Owen Bishop, 2008
The best damn cybercrime and digital forensics book period
Jack Wiles, 2007
Nessus Network Auditing
Russ Rogers, 2008
OS X for Hackers at Heart
Bruce Potter, 2005
OS X for Hackers at Heart
Bruce Potter, 2005
OS X for Hackers at Heart
Bruce Potter, 2006
OS X for Hackers at Heart
Bruce Potter, 2005
OS X for Hackers at Heart
Bruce Potter, 2005
Security Assessment
Russ Rogers, 2004
Consumer's Guide to Cell Phones & Wireless Service
GetConnected.com (Logo), 2001
Consumer's Guide to Cell Phones & Wireless Service
GetConnected.com (Logo), 2001
Botnets: The Killer Web App
Craig Schiller, 2007
Botnets: The Killer Web App
Craig Schiller, 2007