1 |
Markus Jakobsson, Steven Myers, "Phishing and Countermeasures", WILEY‐INTERSCIENCE, USA, 2007
|
2 |
Charles P. Pfleeger, Shari Lawrence Pfleeger, "Security in Computing", Pearson Education, Inc., USA, October 2006
|
3 |
Jon Erickson, "Hacking:The Art of Exploitation" second ed., No Starch Press, January 2008
|
4 |
Ross Anderson, "Security Engineering" second ed., WILEY Publishing, Inc, USA, 2008
|
5 |
John Viega, Gary McGraw, "Building Secure Software", Addison‐Wesley, USA, September 2001
|
6 |
Greg hoglund, James Butler, "Rootkit", Pearson Education, Inc., USA, August 2005
|
7 |
Dafydd Stuttard, Marcus Pinto, "The Web Application Hacker's Handbook:Discovering and Exploiting Security Flaws", WILEY Publishing, Inc, USA, 2008
|
8 |
Gary McGraw, "Software Security", Pearson Education, Inc., USA, January 2006
|
9 |
Peter Szor, "The Art of Computer:Virus Research and Defense", Symantec. Press, USA, February 2005
|
10 |
Markus Jakobsson, Zulfikar Ramzan, "Crimeware: Understanding New Attacks and Defenses", Symantec. Press, USA, April 2008
|
11 |
Shon harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester, "Gray Hat Hacking", McGraw‐Hill Osborne Media, November 2004
|