1. Lombardi M., Ragab E., Chin V., Dandurand Y., de Divitiis V., Burato A. (eds). Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism. IOS Press, 2015. 233 p.
2. McQuade III S.C. Understanding and Managing Cybercrime. Boston: Pearson Education, 2006. 500 p.
3. Katzenbeisser S., Petitcolas F.A.P. (eds.). Information Hiding Techniques for Steganography and Digital Watermarking. Boston: Artech House, 2000. 213 p.
4. Galyashina E.I. Linguistic Analysis in the Speaker Identification Systems: Integrated Comprehensive Approach Based on Forensic Science Technology. Computer Linguistic and Intellectual Technologies. On the Materials of the Annual International Conference “Dialogue” (Moscow, May 27–30, 2015). Issue14 (21). Vol. 1. Moscow: RGGU, 2015. P. 156–168. (In Russ.)
5. Jones R. Internet Forensics. Sebastopol, USA: O’Reilly Media, Inc., 2005. 242 p.