انتشارات Syngress Pub

Implementing digital forensic readiness : from reactive to proactive process
Ivtchenko, Dmitri; Sachowski, Jason, 2016
Preserving Electronic Evidence for Trial. A Team Approach to the Litigation Hold, Data Collection, and Preservation of Digital Evidence
Rojas, Ernesto F.; Zeigler, Ann D, 2016
Network and System Security
John R. Vacca, 2016
Windows Registry Forensics
Harlan Carvey, 2016
Thor's Microsoft security bible : a collection of practical security techniques
Timothy ''Thor'' Mullen, 2011
Mobile Security and Privacy: Advances, Challenges and Future Research Directions
Man Ho Au, Raymond Choo, 2016
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Johnny Long [Long, Johnny], 2011
SQL Injection Attacks and Defense
Justin Clarke-Salt, 2012
SQL Injection Attacks and Defense
Justin Clarke-Salt, 2012
Securing the Internet of Things
Shancang Li and Li Da Xu (Auth.), 2017
Google Hacking for Penetration Testers
Johnny Long, Bill Gardner, Justin Brown, 2015
Penetration Tester’s Open Source Toolkit
Jeremy Faircloth, 2016
The basics of cloud computing. understanding the fundamentals of cloud computing in theory and practice
Derrick Rountree, Ileana Castrillo, 2014
Coding for penetration testers: building better tools
Andress, Jason, Linn, Ryan & Ryan Linn, 2012
The basics of digital privacy: simple tools to protect your personal information and your identity online
Cherry, Denny & Thomas LaRock, 2014
The basics of hacking and penetration testing: ethical hacking and penetration testing made easy
Broad, James; Engebretson, Patrick Henry, 2011
Coding for Penetration Testers
Ryan Linn, Jason Andress, 2016
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Eoghan Casey; James M. Aquilina; Cameron H. Malin; Rob Maxwell, 2012
Eleventh Hour CISSP®. Study Guide
Eric Conrad; Seth Misenar; Joshua Feldman, 2016
Cyber Crime and Cyber Terrorism Investigator's Handbook
Babak Akhgar; Andrew Staniforth; Francesca Bosco, 2014
Cyber Security Awareness for Lawyers
David Willson, Henry Dalziel, 2015