[en] [Stealing the Network 01] • Stealing the Network Syngress Media,U.S.
[en] Introduction to US Cybersecurity Careers Syngress Publishing
[en] Mobile Security and Privacy, Advances, Challenges and Future Research Directions Syngress Publishing
[en] Built to the Hilt · Creating a Muscularly Strong and Superbly Conditioned Body That Will Last a Lifetime The Creative Syndicate
[en] Unified Communications Forensics Syngress Publishing
[en] Implementing Digital Forensic Readiness, From Reactive to Proactive Process Syngress Publishing
[en] Seven Deadliest Web Application Attacks Syngress Publishing
[en] [Primrose Peak Shifters 02] • Mated to the Pack Synapse Press
[en] Protection Syngress Publishing
[en] Low Tech Hacking–Street Smarts for Security Professionals Syngress Publishing
[en] The Basics of Hacking and Penetration Testing Syngress
[en] Professional Penetration Testing Syngress Publishing
[en] SQL Injection Attacks and Defense Syngress Publishing
[en] No Tech Hacking Syngress Publishing
[en] Call Numbers Syntell Smith Publishing
[en] Digital Forensics Processing and Procedures Syngress Publishing
[en] The Basics of Cyber Warfare Syngress Publishing
[en] PCI Compliance Syngress Publishing
[en] Windows 2012 Server Network Security Syngress Publishing