انتشارات Syngress Pub

Cloud Storage Forensics
Darren Quick, Ben Martini, 2014
Cloud Storage Forensics
Darren Quick, 2013
Cloud Storage Forensics
Darren Quick, 2013
Cloud Storage Forensics
Darren Quick, 2013
Computer Incident Response and Forensics Team Management. Conducting a Successful Incident Response
Leighton Johnson (Auth.), 2013
Firewall Policies and VPN Configurations
Syngress, 2006
Firewall Policies and VPN Configurations
Syngress, 2006
Hack Proofing Linux. The Only Way to Stop a Hacker Is to Think Like One
James Stanger, 2001
X-Ways Forensics Practitioner's Guide
Brett Shavers, 2013
X-Ways Forensics Practitioner's Guide
Brett Shavers, 2013
X-Ways Forensics Practitioner’s Guide
Brett Shavers, 2014
Writing Security Tools and Exploits
James C. Foster, 2006