James Russ Rogers · R.R. · R. Rogers
title | ISBN-13 | year of publica- tion | other author(s) |
---|---|---|---|
Hacking a Terror Network: The Silent Threat of Covert Channels | 978-1-928994-98-5 | 2005 | Matthew G Devost |
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job | 978-0-471-77987-2 | 2007 | Chris Butler · Mason Ferratt · Greg Miles · Ed Fuller · Chris Hurley · Rob Cameron · Brian Kirouac |
Nessus Network Auditing | 978-1-59749-208-9 | 2008 | |
Network Security Evaluation Using the NSA IEM | 978-1-59749-035-1 | 2005 | Ed Fuller · Greg Miles · Matthew Hoagberg · Travis Schack · Ted Dykstra · Bryan Cunningham · Chuck Little |
OS X for Hackers at Heart | 978-1-59749-040-5 | 2005 | Bruce Potter · Chris Hurley · Johnny Long · Tom Owad |
Security Assessment: Case Studies for Implementing the NSA IAM | 978-1-932266-96-2 | 2004 | Greg Miles · Ed Fuller · Ted Dykstra |
Syngress IT Security Project Management Handbook | 978-1-59749-076-4 | 2006 | Susan Snedaker |
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators | 978-1-59749-138-9 | 2007 | Jack Wiles · Johnny Long · Ron Green |
WarDriving and Wireless Penetration Testing | 978-1-59749-111-2 | 2007 | Chris Hurley · Frank Thornton · Brian Baker |
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security | 978-1-931836-03-6 | 2004 | Chris Hurley · Michael Puchol · Frank Thornton |