| title | media type | ISBN-13 | year of publica- tion | other author(s) |
|---|---|---|---|---|
| Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions | Paperback | 978-0-07-226304-6 | 2006 | David Pollino · Bill Pennington · Tony Bradley |
| Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions | " | 978-0-07-149461-8 | 2008 | Rich Cannings · Zane Lackey |
| Hacking sur le Web 2.0: Vulnérabilité du Web 2.0 et sécurisation | Broché | 978-2-7440-2306-4 | 2008 | Rich Cannings · Zane Lackey |
| Hacking VoIP: Protocols, Attacks, and Countermeasures | Paperback | 978-1-59327-163-3 | 2008 | |
| Implementing SSH: Strategies for Optimizing the Secure Shell | " | 978-0-471-45880-7 | 2003 | |
| Implementing Ssh: Strategies for Optimizing the Secure Shell | 978-0-7645-5725-5 | 2003 | ||
| Mobile Application Security | Paperback | 978-0-07-163356-7 | 2010 | |
| Securing Storage: A Practical Guide to SAN and NAS Security | Hardcover | 978-0-321-34995-8 | 2005 | |
| Securing Storage: A Practical Guide to SAN and NAS Security | Paperback | 978-0-321-88574-6 | 2005 | |
Addison-Wesley · John Wiley & Sons · McGraw-Hill · No Starch Press · PEARSON (France) · Wiley