انتشارات Syngress Pub

Cyber Security and IT Infrastructure Protection
John R. Vacca, 2013
Cyber Security and IT Infrastructure Protection
John R. Vacca, 2013
Nokia Network Security Solutions Handbook
Syngress, 2002
Bluetooth Application Developer's Guide. The Short Range Interconnect Solution
David Kammer, Gordon McNutt, Brian Senese, 2002
Ruby developers guide
Brian Senese, 2001
Skype me! : from single user to small enterprise and beyond
Michael Gough, 2006
Video conferencing over IP : configure, secure, and troubleshoot
Michael Gough, 2003
Video Conferencing over IP. Configure, Secure and Troubleshoot
Michael Gough, 2006
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Jayson E. Street, 2010
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Jayson E. Street, 2010
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Jayson E. Street, 2010
Securing VoIP: Keeping Your VoIP Network Safe
Regis J. Jr (Bud) Bates, 2014
How to Cheat at Designing Security for a Windows Server 2003 Network
Rob Amini, Elias N. Khnaser, Chris Peiris, Susan Snedaker, 2005
MCSE (Exam 70-298) Study Guide. Designing security for a Windows Server 2003 network: Exam 70-298
Elias N. Khnaser, Susan Snedaker, Chris Peiris, Rob Amini, 2004
InfoSecurity 2008 Threat Analysis
Craig Schiller, 2008
InfoSecurity 2008 Threat Analysis
Craig Schiller, 2007
How to Cheat at Deploying and Securing RFID
Frank Thornton, 2007
RFID Security
Frank Thornton, 2005
RFID Security
Frank Thornton, 2005
War: Driving. Drive, Detect, Defend
Chris Hurley, Frank Thornton, Michael Puchol, 2004
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
Chris Hurley, 2004
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
Chris Hurley, 2004
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
Chris Hurley, 2004