Craiger, Philip, Shenoi, Sujeet, & IFIP International Conference on Digital Forensics. (2007). Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007: Vol. International Federation for Information Processing. Springer.
Cross, M. (2007). Developer’s guide to web application security [Electronic resource]. Syngress Pub. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=289735
Davis, C., Cowen, D., & Philipp, A. (2009). Hacking exposed computer forensics: secrets & solutions (2nd ed) [Electronic resource]. McGraw-Hill. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=4657693
Grimes, Roger A. & Johansson, Jesper M. (2007). Windows Vista security: securing Vista against malicious attacks. Wiley.
Hook, D. (2005). Beginning cryptography with Java [Electronic resource]. Wiley Pub. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=290512
Jones, Keith J., Bejtlich, Richard, & Rose, Curtis W. (2005). Real digital forensics: computer security and incident response. Addison-Wesley.
Lambrinoudakis, Costas, Pernul, G., Tjoa, A Min, & TrustBus 2007. (2007). Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; proceedings: Vol. Lecture notes in computer science. Springer.
Marshall, Angus M. (2008a). Digital forensics: digital evidence in criminal investigation. Wiley.
Marshall, Angus M. (2008b). Digital forensics: digital evidence in criminal investigation [Electronic resource]. Wiley-Blackwell. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=454424
Mayer, Frank, MacMillan, Karl, & Caplan, David. (2006). SELinux by example: using security enhanced Linux: Vol. Prentice Hall open source software development series. Prentice Hall.
Skoudis, Ed. (2003). Malware: fighting malicious code: Vol. Prentice Hall series in computer networking and distributed. Prentice Hall PTR.
Slade, Robert. (2004). Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill.