1
Craiger, Philip, Shenoi, Sujeet, IFIP International Conference on Digital Forensics. Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. New York: : Springer 2007.
2
Cross M. Developer’s guide to web application security. Rockland, MA: : Syngress Pub 2007. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=289735
3
Davis C, Cowen D, Philipp A. Hacking exposed computer forensics: secrets & solutions. 2nd ed. London: : McGraw-Hill 2009. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=4657693
4
Grimes, Roger A., Johansson, Jesper M. Windows Vista security: securing Vista against malicious attacks. Hoboken, N.J.: : Wiley 2007.
5
Hook D. Beginning cryptography with Java. Indianapolis, IN: : Wiley Pub 2005. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=290512
6
Jones, Keith J., Bejtlich, Richard, Rose, Curtis W. Real digital forensics: computer security and incident response. Boston, Mass: : Addison-Wesley 2005.
7
Lambrinoudakis, Costas, Pernul, G., Tjoa, A Min, et al. Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; proceedings. Berlin: : Springer 2007.
8
Marshall, Angus M. Digital forensics: digital evidence in criminal investigation. Chichester: : Wiley 2008.
9
Marshall, Angus M. Digital forensics: digital evidence in criminal investigation. Chichester, West Sussex, U.K.: : Wiley-Blackwell 2008. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=454424
10
Mayer, Frank, MacMillan, Karl, Caplan, David. SELinux by example: using security enhanced Linux. Harlow: : Prentice Hall 2006.
11
Skoudis, Ed. Malware: fighting malicious code. Upper Saddle River, N.J.: : Prentice Hall PTR 2003.
12
Slade, Robert. Software forensics: collecting evidence from the scene of a digital crime. London: : McGraw-Hill 2004.