1.
Craiger, Philip, Shenoi, Sujeet, IFIP International Conference on Digital Forensics: Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. Springer, New York (2007).
2.
Cross, M.: Developer’s guide to web application security. Syngress Pub, Rockland, MA (2007).
3.
Davis, C., Cowen, D., Philipp, A.: Hacking exposed computer forensics: secrets & solutions. McGraw-Hill, London (2009).
4.
Grimes, Roger A., Johansson, Jesper M.: Windows Vista security: securing Vista against malicious attacks. Wiley, Hoboken, N.J. (2007).
5.
Hook, D.: Beginning cryptography with Java. Wiley Pub, Indianapolis, IN (2005).
6.
Jones, Keith J., Bejtlich, Richard, Rose, Curtis W.: Real digital forensics: computer security and incident response. Addison-Wesley, Boston, Mass (2005).
7.
Lambrinoudakis, Costas, Pernul, G., Tjoa, A Min, TrustBus 2007: Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; proceedings. Springer, Berlin (2007).
8.
Marshall, Angus M.: Digital forensics: digital evidence in criminal investigation. Wiley, Chichester (2008).
9.
Marshall, Angus M.: Digital forensics: digital evidence in criminal investigation. Wiley-Blackwell, Chichester, West Sussex, U.K. (2008).
10.
Mayer, Frank, MacMillan, Karl, Caplan, David: SELinux by example: using security enhanced Linux. Prentice Hall, Harlow (2006).
11.
Skoudis, Ed: Malware: fighting malicious code. Prentice Hall PTR, Upper Saddle River, N.J. (2003).
12.
Slade, Robert: Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill, London (2004).