- Defense and Security 2007: Sensor Data Exploitation, Target Recognition, and Information Fusion, Data Mining, and Information Networks Security Technologies (Proceedings of Spie)
- Hacking With Kali Linux: 2 Books in 1: A Beginner’s Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully … Computer Cyber Security (Part 1 and Part 2)