1.
Craiger, Philip, Shenoi, Sujeet, & IFIP International Conference on Digital Forensics. Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. vol. International Federation for Information Processing (Springer, 2007).
2.
Cross, M. Developer’s guide to web application security. (Syngress Pub, 2007).
3.
Davis, C., Cowen, D. & Philipp, A. Hacking exposed computer forensics: secrets & solutions. (McGraw-Hill, 2009).
4.
Grimes, Roger A. & Johansson, Jesper M. Windows Vista security: securing Vista against malicious attacks. (Wiley, 2007).
5.
Hook, D. Beginning cryptography with Java. (Wiley Pub, 2005).
6.
Jones, Keith J., Bejtlich, Richard, & Rose, Curtis W. Real digital forensics: computer security and incident response. (Addison-Wesley, 2005).
7.
Lambrinoudakis, Costas, Pernul, G., Tjoa, A Min, & TrustBus 2007. Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; proceedings. vol. Lecture notes in computer science (Springer, 2007).
8.
Marshall, Angus M. Digital forensics: digital evidence in criminal investigation. (Wiley, 2008).
9.
Marshall, Angus M. Digital forensics: digital evidence in criminal investigation. (Wiley-Blackwell, 2008).
10.
Mayer, Frank, MacMillan, Karl, & Caplan, David. SELinux by example: using security enhanced Linux. vol. Prentice Hall open source software development series (Prentice Hall, 2006).
11.
Skoudis, Ed. Malware: fighting malicious code. vol. Prentice Hall series in computer networking and distributed (Prentice Hall PTR, 2003).
12.
Slade, Robert. Software forensics: collecting evidence from the scene of a digital crime. (McGraw-Hill, 2004).