Craiger, Philip, Shenoi, Sujeet, and IFIP International Conference on Digital Forensics. 2007. Advances in Digital Forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. Vol. International Federation for Information Processing. New York: Springer.
Cross, Michael. 2007. Developer’s Guide to Web Application Security. Electronic resource. Rockland, MA: Syngress Pub. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=289735.
Davis, Chris, David Cowen, and Aaron Philipp. 2009. Hacking Exposed Computer Forensics: Secrets & Solutions. Electronic resource. 2nd ed. London: McGraw-Hill. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=4657693.
Grimes, Roger A. and Johansson, Jesper M. 2007. Windows Vista Security: Securing Vista against Malicious Attacks. Hoboken, N.J.: Wiley.
Hook, David. 2005. Beginning Cryptography with Java. Electronic resource. Indianapolis, IN: Wiley Pub. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=290512.
Jones, Keith J., Bejtlich, Richard, and Rose, Curtis W. 2005. Real Digital Forensics: Computer Security and Incident Response. Boston, Mass: Addison-Wesley.
Lambrinoudakis, Costas, Pernul, G., Tjoa, A Min, and TrustBus 2007. 2007. Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; Proceedings. Vol. Lecture notes in computer science. Berlin: Springer.
Marshall, Angus M. 2008a. Digital Forensics: Digital Evidence in Criminal Investigation. Chichester: Wiley.
———. 2008b. Digital Forensics: Digital Evidence in Criminal Investigation. Electronic resource. Chichester, West Sussex, U.K.: Wiley-Blackwell. https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=454424.
Mayer, Frank, MacMillan, Karl, and Caplan, David. 2006. SELinux by Example: Using Security Enhanced Linux. Vol. Prentice Hall open source software development series. Harlow: Prentice Hall.
Skoudis, Ed. 2003. Malware: Fighting Malicious Code. Vol. Prentice Hall series in computer networking and distributed. Upper Saddle River, N.J.: Prentice Hall PTR.
Slade, Robert. 2004. Software Forensics: Collecting Evidence from the Scene of a Digital Crime. London: McGraw-Hill.