Craiger, Philip, Shenoi, Sujeet, and IFIP International Conference on Digital Forensics. 2007. Advances in Digital Forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. Vol. International Federation for Information Processing. New York: Springer.
Cross, Michael. 2007. Developer’s Guide to Web Application Security. Rockland, MA: Syngress Pub.
Davis, Chris, David Cowen, and Aaron Philipp. 2009. Hacking Exposed Computer Forensics: Secrets & Solutions. 2nd ed. London: McGraw-Hill.
Grimes, Roger A. and Johansson, Jesper M. 2007. Windows Vista Security: Securing Vista against Malicious Attacks. Hoboken, N.J.: Wiley.
Hook, David. 2005. Beginning Cryptography with Java. Indianapolis, IN: Wiley Pub.
Jones, Keith J., Bejtlich, Richard, and Rose, Curtis W. 2005. Real Digital Forensics: Computer Security and Incident Response. Boston, Mass: Addison-Wesley.
Lambrinoudakis, Costas, Pernul, G., Tjoa, A Min, and TrustBus 2007. 2007. Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; Proceedings. Vol. Lecture notes in computer science. Berlin: Springer.
Marshall, Angus M. 2008a. Digital Forensics: Digital Evidence in Criminal Investigation. Chichester: Wiley.
Marshall, Angus M. 2008b. Digital Forensics: Digital Evidence in Criminal Investigation. Chichester, West Sussex, U.K.: Wiley-Blackwell.
Mayer, Frank, MacMillan, Karl, and Caplan, David. 2006. SELinux by Example: Using Security Enhanced Linux. Vol. Prentice Hall open source software development series. Harlow: Prentice Hall.
Skoudis, Ed. 2003. Malware: Fighting Malicious Code. Vol. Prentice Hall series in computer networking and distributed. Upper Saddle River, N.J.: Prentice Hall PTR.
Slade, Robert. 2004. Software Forensics: Collecting Evidence from the Scene of a Digital Crime. London: McGraw-Hill.