@book{Craiger, Philip_Shenoi, Sujeet_IFIP International Conference on Digital Forensics_2007, address={New York}, title={Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007}, volume={International Federation for Information Processing}, publisher={Springer}, author={Craiger, Philip and Shenoi, Sujeet and IFIP International Conference on Digital Forensics}, year={2007} }
@book{Cross_2007, address={Rockland, MA}, title={Developer’s guide to web application security}, url={https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=289735}, publisher={Syngress Pub}, author={Cross, Michael}, year={2007} }
@book{Davis_Cowen_Philipp_2009, address={London}, edition={2nd ed}, title={Hacking exposed computer forensics: secrets & solutions}, url={https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=4657693}, publisher={McGraw-Hill}, author={Davis, Chris and Cowen, David and Philipp, Aaron}, year={2009} }
@book{Grimes, Roger A._Johansson, Jesper M._2007, address={Hoboken, N.J.}, title={Windows Vista security: securing Vista against malicious attacks}, publisher={Wiley}, author={Grimes, Roger A. and Johansson, Jesper M.}, year={2007} }
@book{Hook_2005, address={Indianapolis, IN}, title={Beginning cryptography with Java}, url={https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=290512}, publisher={Wiley Pub}, author={Hook, David}, year={2005} }
@book{Jones, Keith J._Bejtlich, Richard_Rose, Curtis W._2005, address={Boston, Mass}, title={Real digital forensics: computer security and incident response}, publisher={Addison-Wesley}, author={Jones, Keith J. and Bejtlich, Richard and Rose, Curtis W.}, year={2005} }
@book{Lambrinoudakis, Costas_Pernul, G._Tjoa, A Min_TrustBus 2007_2007, address={Berlin}, title={Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; proceedings}, volume={Lecture notes in computer science}, publisher={Springer}, author={Lambrinoudakis, Costas and Pernul, G. and Tjoa, A Min and TrustBus 2007}, year={2007} }
@book{Marshall, Angus M._2008a, address={Chichester}, title={Digital forensics: digital evidence in criminal investigation}, publisher={Wiley}, author={Marshall, Angus M.}, year={2008} }
@book{Marshall, Angus M._2008b, address={Chichester, West Sussex, U.K.}, title={Digital forensics: digital evidence in criminal investigation}, url={https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=454424}, publisher={Wiley-Blackwell}, author={Marshall, Angus M.}, year={2008} }
@book{Mayer, Frank_MacMillan, Karl_Caplan, David_2006, address={Harlow}, title={SELinux by example: using security enhanced Linux}, volume={Prentice Hall open source software development series}, publisher={Prentice Hall}, author={Mayer, Frank and MacMillan, Karl and Caplan, David}, year={2006} }
@book{Skoudis, Ed_2003, address={Upper Saddle River, N.J.}, title={Malware: fighting malicious code}, volume={Prentice Hall series in computer networking and distributed}, publisher={Prentice Hall PTR}, author={Skoudis, Ed}, year={2003} }
@book{Slade, Robert_2004, address={London}, title={Software forensics: collecting evidence from the scene of a digital crime}, publisher={McGraw-Hill}, author={Slade, Robert}, year={2004} }