انتشارات Mcgraw Hill

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Linux
Hatch, Brian, 2008
Hacking Exposed Linux, 3rd Edition
ISECOM, 2008
Hacking Exposed Linux, 3rd Edition
ISECOM, 2008
Hacking exposed malware & rootkits: malware & rootkits security secrets & solutions
Michael Davis, Sean Bodmer, Aaron LeMasters, 2010
Hacking Exposed Malware and Rootkits: Malware & Rootkits Secrets and Solutions
Michael Davis, Sean Bodmer, Aaron LeMasters, 2009
Hacking Exposed Mobile Security Secrets & Solutions
Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse, 2013
Hacking Exposed Mobile: Security Secrets & Solutions
Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price, 2013
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Mark Collier, David Endler, 2013
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
David Endler, Mark Collier, 2006
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
Rich Cannings; Himanshu Dwivedi; Zane Lackey, 2008
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
Rich Cannings; Himanshu Dwivedi; Zane Lackey, 2008
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Rich Cannings, Himanshu Dwivedi, Zane Lackey, 2007
Hacking Exposed Web Applications, 3rd Edition: Web Applications Security Secrets and Solutions
Joel Scambray, Vincent Liu, Caleb Sima, 2010
Hacking Exposed, 6th Edition: Network Security Secrets and Solutions
Stuart McClure, Joel Scambray, George Kurtz, 2009
Hacking exposed, computer forensics
Philipp, Aaron; Davis, Chris; Cowen, David, 2010
Hacking Exposed. Linux
ISECOM, 2008