انتشارات Mcgraw Hill Osborne Media.

Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache, Vincent Liu, 2007
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache, Vincent Liu, 2007
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Joshua Wright, Johnny Cache, 2014
Hacking Exposed Wireless: Wireless Security Secrets & Solutions, 2nd edition
Johnny Cache, Joshua Wright, Vincent Liu, 2010
Botnets: The Killer Web Applications
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi, 2006
Essential Computer Security
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi, 2006
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Victor Oppleman, Oliver Friedrichs, Brett Watson, 2005
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, 2007
Gray Hat Hacking: The Ethical Hacker’s Handbook
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, 2007
CCNA Cisco Certified Network Associate Study Guide (Exam 640-802)
Richard Deal, 2008
CCNA Cisco Certified Network Associate Study Guide: Exam 640-801
Todd Lammle, 2003
CCENT Cisco Certified Entry Networking Technician Study Guide Exam 640.822
Angela Walker, 2008
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Shon Harris, Allen Harper, Jonathan Ness, Terron Williams, Gideon Lenkey, 2011
Hacking Exposed
Stuart McClure, Joel Scambray, George Kurtz, 2005
Hacking Exposed 7: Network Security Secrets & Solutions
Stuart McClure, Joel Scambray, George Kurtz, 2012
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Linux, 3rd Edition
ISECOM, 2008
Hacking Exposed Linux, 3rd Edition
ISECOM, 2008
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Mark Collier, David Endler, 2013