انتشارات New York, Mcgraw Hill

Gray hat hacking : the ethical hacker's handbook
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, 2011
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Shon Harris, Allen Harper, Jonathan Ness, Terron Williams, Gideon Lenkey, 2011
Hacking Exposed
Stuart McClure, Joel Scambray, George Kurtz, 2005
Hacking Exposed
Stuart McClure, George Kurtz, Joel Scambray, 2000
Hacking Exposed
2009
Hacking exposed 6 : network security secrets & solutions
Stuart McClure; Joel Scambray; George Kurtz, 2009
Hacking exposed 6 : network security secrets & solutions
Stuart McClure; Joel Scambray; George Kurtz, 2009
Hacking Exposed 7: Network Security Secrets & Solutions
Stuart McClure, Joel Scambray, George Kurtz, 2012
Hacking exposed Cisco networks: Cisco security secrets & solutions
Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky, 2006
Hacking exposed computer forensics : secrets & solutions
Aaron Philipp; David Cowen; Chris Davis, CISSP, 2010
Hacking Exposed Computer Forensics, 2nd Edition: Computer Forensics Secrets and Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Linux
Hatch, Brian, 2008
Hacking Exposed Linux, 3rd Edition
ISECOM, 2008
Hacking Exposed Linux, 3rd Edition
ISECOM, 2008