[ { "title" : "Windows Forensics and Incident Recovery (Addison-Wesley Microsoft Technology Series)", "isbn" : "0321200985", "date" : "2005-10-02T15:40:29.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Harlan Carvey", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Real Digital Forensics: Computer Security and Incident Response", "isbn" : "0321240693", "date" : "2005-12-29T07:24:18.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Keith J. Jones, Richard Bejtlich, Curtis W. Rose", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Hacking Exposed Computer Forensics: Computer Forensics Secrets \u0026 Solutions", "isbn" : "0072256753", "date" : "2005-10-02T15:46:12.000Z", "publisher" : "McGraw-Hill Osborne Media", "authors" : "Chris Davis, Aaron Philipp, David Cowen", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Tao of Network Security Monitoring: Beyond Intrusion Detection", "isbn" : "0321246772", "date" : "2005-10-02T15:38:55.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Richard Bejtlich", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Design and Implementation of the FreeBSD Operating System, The", "isbn" : "0201702452", "date" : "2005-10-02T15:54:44.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Marshall Kirk Neville-Neil, George V. McKusick", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Extrusion Detection: Security Monitoring for Internal Intrusions", "isbn" : "0321349962", "date" : "2005-12-29T07:25:20.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Richard Bejtlich", "categories" : "", "score" : "", "comment" : "" } ]