انتشارات Syngress, , Elsevier Inc

Cyber reconnaissance, surveillance, and defense
Robert Shimonski, 2015
Smart Grid Security. Innovative Solutions for a Modernized Grid
Florian Skopik, Paul Dr. Smith, 2015
Blackhatonomics : an inside look at the economics of cybercrime
Will Gragido &, 2013
Cyber crime and cyber terrorism investigator's handbook
Babak Akhgar, 2014
Information hiding in speech signals for secure communication
Zhijun Wu, 2015
Windows performance analysis field guide
Clint Huffman, 2015
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Harlan A. Carvey, 2011
Breaking into information security : crafting a custom career path to get the job you really want
Liu, Chris; More, Josh; Stieber, Anthony J, 2015
Wireless reconnaissance in penetration testing
Neely, Matthew, 2013
Operating System Forensics
Messier, 2016
Seven Deadliest Wireless Technologies Attacks
Brad Haines (Auth.), 2010
Cyber Security Awareness for CEOs and Management
Dalziel, Henry, 2016
Automating open source intelligence : algorithms for OSINT
Layton, Robert, 2016
Theoretical and Experimental Methods for Defending Against DDOS Attacks
Amiri, Iraj Sadegh, 2016
The Best Damn IT Security Management Book Period
Susan Snrdakr Robrt Mcrir Karim Vrlani, 2007
The Best Damn Windows Server 2008 Book Period
Anthony Piltzecker, 2008
Digital forensics : threatscape and best practices
Sammons, 2015
Infosec Management Fundamentals
Dalziel, 2015