انتشارات Elsevier, Syngress
![Cyber reconnaissance, surveillance, and defense](http://cdn.ketabkoo.com/covers/10/1052572-n.jpg)
Cyber reconnaissance, surveillance, and defense
Robert Shimonski, 2015![Breaking into information security : crafting a custom career path to get the job you really want](http://cdn.ketabkoo.com/covers/1/107308-n.jpg)
Breaking into information security : crafting a custom career path to get the job you really want
Liu, Chris; More, Josh; Stieber, Anthony J, 2015![Smart Grid Security. Innovative Solutions for a Modernized Grid](http://cdn.ketabkoo.com/covers/1/119913-n.jpg)
Smart Grid Security. Innovative Solutions for a Modernized Grid
Florian Skopik, Paul Dr. Smith, 2015![Wireless reconnaissance in penetration testing](http://cdn.ketabkoo.com/covers/3/324780-n.jpg)
Wireless reconnaissance in penetration testing
Neely, Matthew, 2013![Operating System Forensics](http://cdn.ketabkoo.com/covers/4/412560-n.jpg)
Operating System Forensics
Messier, 2016![Seven Deadliest Wireless Technologies Attacks](http://cdn.ketabkoo.com/covers/4/484609-n.jpg)
Seven Deadliest Wireless Technologies Attacks
Brad Haines (Auth.), 2010![Blackhatonomics : an inside look at the economics of cybercrime](http://cdn.ketabkoo.com/covers/5/504722-n.jpg)
Blackhatonomics : an inside look at the economics of cybercrime
Will Gragido &, 2013![Cyber crime and cyber terrorism investigator's handbook](http://cdn.ketabkoo.com/covers/5/510435-n.jpg)
Cyber crime and cyber terrorism investigator's handbook
Babak Akhgar, 2014![Cyber Security Awareness for CEOs and Management](http://cdn.ketabkoo.com/covers/5/510436-n.jpg)
Cyber Security Awareness for CEOs and Management
Dalziel, Henry, 2016![Automating open source intelligence : algorithms for OSINT](http://cdn.ketabkoo.com/covers/5/513210-n.jpg)
Automating open source intelligence : algorithms for OSINT
Layton, Robert, 2016![Information hiding in speech signals for secure communication](http://cdn.ketabkoo.com/covers/5/544124-n.jpg)
Information hiding in speech signals for secure communication
Zhijun Wu, 2015![Windows performance analysis field guide](http://cdn.ketabkoo.com/covers/5/544125-n.jpg)
Windows performance analysis field guide
Clint Huffman, 2015![Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry](http://cdn.ketabkoo.com/covers/5/544126-n.jpg)
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Harlan A. Carvey, 2011![Theoretical and Experimental Methods for Defending Against DDOS Attacks](http://cdn.ketabkoo.com/covers/5/586002-n.jpg)
Theoretical and Experimental Methods for Defending Against DDOS Attacks
Amiri, Iraj Sadegh, 2016![The Best Damn IT Security Management Book Period](http://cdn.ketabkoo.com/covers/6/613175-n.jpg)
The Best Damn IT Security Management Book Period
Susan Snrdakr Robrt Mcrir Karim Vrlani, 2007![The Best Damn Windows Server 2008 Book Period](http://cdn.ketabkoo.com/covers/6/613176-n.jpg)
The Best Damn Windows Server 2008 Book Period
Anthony Piltzecker, 2008![Digital forensics : threatscape and best practices](http://cdn.ketabkoo.com/covers/6/647451-n.jpg)
Digital forensics : threatscape and best practices
Sammons, 2015![Infosec Management Fundamentals](http://cdn.ketabkoo.com/covers/6/647452-n.jpg)
Infosec Management Fundamentals
Dalziel, 2015![Mobile data loss : threats and countermeasures](http://cdn.ketabkoo.com/covers/7/721721-n.jpg)