انتشارات Syngress

X-Ways Forensics Practitioner’s Guide
Brett Shavers, 2014
Writing Security Tools and Exploits
James C. Foster, 2006
Wireless Reconnaissance in Penetration Testing
Matthew Neely, 2012
Wireless reconnaissance in penetration testing
Neely, Matthew, 2013
The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
Anthony Piltzecker, 2008
The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
Anthony Piltzecker, 2008
The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
Anthony Piltzecker, 2008
Configuring Exchange Server 2007
Henrik Walther, 2007
CYA: Securing Exchange Server 2003 & Outlook Web Access
Walther H., 2004
CYA: Securing Exchange Server 2003 & Outlook Web Access
Henrik Walther, 2004
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
How to Defeat Advanced Malware: New Tools for Protection and Forensics
Henry Dalziel, 2014
Palm OS Web Application Developer's Guide
Ben Combee, 2001
Palm OS Web Application Developer's Guide
Ben Combee, 2001
Google Talking
Joshua Brashars, 2007
Hackproofing Your Wireless Network
Syngress, 2002
Hackproofing Your Wireless Network
Syngress, 2002