انتشارات Syngress Pub

CheckPoint NG Security Administration
Dan Kaminsky, 2002
Buffer Overflow Attacks - Detect, Exploit, Prevent
Hagen Graf, 2005
Buffer Overflow Attacks: Detect, Exploit, Prevent
Erik Pace Birkholz, 2005
Configuring SonicWALL firewalls
Chris Lathem, 2006
Configuring Windows 2000 Server Security
Thomas W. Shinder, 2000
Configuring Windows 2000 Without Active Directory
Thomas Shinder, 2001
Cross Site Scripting Attacks
Jay Beale, 2004
Cryptography for Developers
Tom St Denis, 2007
cya securing iis 6.0
Chris Peiris
CYA Securing IIS 6.0. Cover Your A** by Getting It Right the First Time
Chun Hai (Bernard) Cheah, Ken Schaefer, 2004
Cyber adversary characterization : auditing the hacker mind
Tom Parker, 2004
Cyber adversary characterization : auditing the hacker mind
Tom Parker, 2004
Building a Vo: IP Network with Nortel's Multimedia Communication Server 5100
Larry Chaffin (Auth.), 2006
Building an Intelligence-Led Security Program
Allan Liska, 2014
Big: Num Math. Implementing Cryptographic Multiple Precision Arithmetic
Tom St Denis, Greg Rose, 2006
BigNum Math - Impl. Crypo. Mult. Precicion Arithmetic
T. St. Denis, 2006
BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic
Tom St Denis, 2006
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
Tom St Denis, 2006
Biz: Talk Server 2000 Developer's Guide
Robert Shimonski, Chris Farmer, Henk-Evert Sonder, 2002
Blackhatonomics
2013