[1]
Craiger, Philip et al. 2007. Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. Springer.
[2]
Cross, M. 2007. Developer’s guide to web application security. Syngress Pub.
[3]
Davis, C. et al. 2009. Hacking exposed computer forensics: secrets & solutions. McGraw-Hill.
[4]
Grimes, Roger A. and Johansson, Jesper M. 2007. Windows Vista security: securing Vista against malicious attacks. Wiley.
[5]
Hook, D. 2005. Beginning cryptography with Java. Wiley Pub.
[6]
Jones, Keith J. et al. 2005. Real digital forensics: computer security and incident response. Addison-Wesley.
[7]
Lambrinoudakis, Costas et al. 2007. Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; proceedings. Springer.
[8]
Marshall, Angus M. 2008. Digital forensics: digital evidence in criminal investigation. Wiley.
[9]
Marshall, Angus M. 2008. Digital forensics: digital evidence in criminal investigation. Wiley-Blackwell.
[10]
Mayer, Frank et al. 2006. SELinux by example: using security enhanced Linux. Prentice Hall.
[11]
Skoudis, Ed 2003. Malware: fighting malicious code. Prentice Hall PTR.
[12]
Slade, Robert 2004. Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill.