![book Cyber security engineering: a practical approach for systems and software assurance](/covers/files_170/2723000/58ef3da0669b2be9f770d809ac8245f3-g.jpg)
- Author: Mead Nancy R., Woody Carol C
- Language: English
- Year: 2017
![book Snort intrusion detection](/covers/files_170/2711000/2a582a07e40b998596bf838a1d152623-g.jpg)
- Author: Koziol Jack
- Language: English
- Year: 2003
![book Network anomaly detection: a machine learning perspective](/covers/files_170/2685000/cb1e2c9c26483d507211a7d8dabf1448-g.jpg)
- Author: Bhattacharyya Dhruba K
- Language: English
- Year: 2014
![book Hacking the Xbox: an introduction to reverse engineering](/covers/files_170/2679000/307bbcc5e864ef22f660f481b536b7bc-g.jpg)
- Author: Huang Andrew
- Language: English
- Year: 2003
![book Digital Forensics with Open Source Tools](/covers/files_170/2595000/dd7ae339da291c33148f524ccfc8e074-g.jpg)
- Author: Altheide Cory, Carvey Harlan A., Davidson Ray
- Language: English
- Year: 2011
![book Hacking the Xbox: an introduction to reverse engineering](/covers/files_170/2571000/d14d90fa43e40986925e930cc2366949-g.jpg)
- Author: Andrew bunnie Huang
- Language: English
- Year: 2003
![book Hacking the Xbox: an introduction to reverse engineering](/covers/files_170/2571000/08c47dab7934d2de1594f9ea33671bf6-g.jpg)
- Author: Andrew bunnie Huang
- Language: English
- Year: 2003
![book Network security firewalls and VPNs](/covers/files_170/2366000/7d6f620a91408b38f4d32924b6f0776f-d.jpg)
- Author: Stewart James Michael
- Language: English
- Year: 2014
![book Multimedia watermarking techniques and applications](/covers/files_170/2185000/11fb14954cfe1e5debea217bcb3bd84d-d.jpg)
- Author: Kirovski Darko, Furht Borivoje
- Language: English
- Year: 2006