انتشارات Syngress Pub

UTM Security with Fortinet. Mastering Forti: OS
Kenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, 2013
UTM Security with Fortinet. Mastering FortiOS
Kenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, 2012
UTM Security with Fortinet: Mastering FortiOS
Kenneth Tam, 2012
Unified Communications Forensics: Anatomy of Common UC Attacks
Nicholas Grant, 2013
PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance
Branden R. Williams, 2014
Stealing the Network: How to Own a Shadow
Johnny Long, 2007
Stealing the Network: How to Own a Shadow. The Chase for Knuth
Johnny Long, Timothy (Thor) Mullen, 2007
Stealing the network: the complete series collector's edition
Johnny Long, 2009
Security+ Study Guide and DVD Training System
Norris L. Johnson, 2002
Mobile data loss : threats and countermeasures
Raggo, 2015
The Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions
Jesse Varsalone, 2008
The Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions
Jesse Varsalone, 2008
Nokia Firewall, VPN, and IPSO Configuration Guide
Andrew Hay, 2008
Securing IM and P2P Applications for the Enterprise
Marcus Sachs, 2005
Ethereal Packet Sniffing
Syngress, 2004
Developing .Net Web Services With Xml
David Jorgensen, 2002