انتشارات Syngress Pub

Snort 2.1 Intrusion Detection
Johnny Long, 2005
Seven Deadliest Microsoft Attacks
Rob Kraus, 2010
Seven Deadliest Web Application Attacks
Mike Shema, 2010
Configuring Citrix Meta: Frame XP for Windows. Including Feature Release 1
Chris Broomes, Elias N. Khnaser, Ralph Crump, 2002
Network+ Study Guide & Practice Exams: Exam N10-003
Robert J Shimonski Laura E Hunter Norris L Johnson, 2005
Sniffer Pro Network Optimization and Troubleshooting Handbook
Robert J. Shimonski, 2002
Troubleshooting Windows 2000 TCP IP
Syngress, 2000
Troubleshooting Windows 2000 TCP/IP
Syngress, 2000
Configuring Symantec Antivirus, Corporate Edition
Laura E Hunter, 2003
Network+ Study Guide & Practice Exams. Exam N10-003
Robert J. Shimonski, Michael Cross, 2005
Microsoft Windows Server 2008 R2. The Administrator's Essential Reference
Dustin Hannifin, Naomi J. Alpern, 2010
How to Cheat at Securing a Wireless Network
Chris Hurley, 2006
InfoSec Career Hacking Sell Your Skillz, Not Your Soul
Aaron W. Bayles, 2005
OS X for Hackers at Heart. The Apple of Every Hacker's Eye
Ken Caruso, Chris Hurley, Johnny Long, Preston Norvell, Tom Owad, 2005
Penetration Testers. Open Source Toolkit
Jeremy Faircloth, 2007
Zen and the Art of Information Security
Ira Winkler, 2007
Configuring Juniper Networks Net: Screen & SSG Firewalls
Rob Cameroon, Brad Woodberg, Mohan Krishnamurthy Madwachar, Mike Swarm, Neil R. Wyler, Matthew Albers, 2006
Operating System Forensics
Messier, 2016
Social Media Security: Leveraging Social Networking While Mitigating Risk
Michael Cross, 2013