Craiger, Philip, Shenoi, Sujeet, and IFIP International Conference on Digital Forensics. Advances in Digital Forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. International Federation for Information Processing. New York: Springer, 2007. Print.
Cross, Michael. Developer’s Guide to Web Application Security. Rockland, MA: Syngress Pub, 2007. Web. <https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=289735>.
Davis, Chris, David Cowen, and Aaron Philipp. Hacking Exposed Computer Forensics: Secrets & Solutions. 2nd ed. London: McGraw-Hill, 2009. Web. <https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=4657693>.
Grimes, Roger A. and Johansson, Jesper M. Windows Vista Security: Securing Vista against Malicious Attacks. Hoboken, N.J.: Wiley, 2007. Print.
Hook, David. Beginning Cryptography with Java. Indianapolis, IN: Wiley Pub, 2005. Web. <https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=290512>.
Jones, Keith J., Bejtlich, Richard, and Rose, Curtis W. Real Digital Forensics: Computer Security and Incident Response. Boston, Mass: Addison-Wesley, 2005. Print.
Lambrinoudakis, Costas et al. Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; Proceedings. Lecture notes in computer science. Berlin: Springer, 2007. Print.
Marshall, Angus M. Digital Forensics: Digital Evidence in Criminal Investigation. Chichester: Wiley, 2008. Print.
---. Digital Forensics: Digital Evidence in Criminal Investigation. Chichester, West Sussex, U.K.: Wiley-Blackwell, 2008. Web. <https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=454424>.
Mayer, Frank, MacMillan, Karl, and Caplan, David. SELinux by Example: Using Security Enhanced Linux. Prentice Hall open source software development series. Harlow: Prentice Hall, 2006. Print.
Skoudis, Ed. Malware: Fighting Malicious Code. Prentice Hall series in computer networking and distributed. Upper Saddle River, N.J.: Prentice Hall PTR, 2003. Print.
Slade, Robert. Software Forensics: Collecting Evidence from the Scene of a Digital Crime. London: McGraw-Hill, 2004. Print.