انتشارات Syngress

Zen and the Art of Information Security
Ira Winkler, 2007
Configuring Juniper Networks Net: Screen & SSG Firewalls
Rob Cameroon, Brad Woodberg, Mohan Krishnamurthy Madwachar, Mike Swarm, Neil R. Wyler, Matthew Albers, 2006
Operating System Forensics
Messier, 2016
Social Media Security: Leveraging Social Networking While Mitigating Risk
Michael Cross, 2013
Social Media Security: Leveraging Social Networking While Mitigating Risk
Michael Cross, 2013
i: Phone and i: OS Forensics. Investigation, Analysis and Mobile Security for Apple i: Phone, i: Pad and i: OS Devices
Andrew Hoog And Katie Strzempka (Auth.), 2011
Migrating to the cloud : Oracle client/server modernization
Tom Laszewski, 2012
Check Point™ Next Generation with Application Intelligence Security
Chris Tobkin, 2004
Penetration Tester's: Open Source Toolkit
Jeremy Faircloth, 2005
Snort 2.1 : intrusion detection
Andrew R Baker, 2004
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Melissa Craft (Editor), 2005
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Melissa Craft (Editor), 2005
Hack proofing ColdFusion
Greg Meyer, 2002
Hack proofing ColdFusion
Greg Meyer, 2002
Configuring VMware ESX Server 2.5
Al Muller, 2005
How to Cheat at Configuring Vmware Esx Server
David Rule Jr., 2007
How to Cheat at Configuring VmWare ESX Server
David Rule Jr., 2007