2015

BR11. Tsalis N., Gritzalis D., Review of "Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques" (by S. Chauhan & N. K. Panda), Elsevier Publications, USA, 2015. In: Computers & Security, 2015.

BR10. Stavrou V., Gritzalis D., Review of "Introduction to Social Media Investigation - A hands-on Approach" (by J. Golbeck), Elsevier Publications, 2015. In: Computers & Security, 2015.

BR9. Stergiopoulos G., Gritzalis D., Review of "Hacking and Penetration Testing with Low Power Devices" (by P. Polstra), Syngress, 2015. In: Computers and Security, Vol. 49, pp. 274-275, 2015.

2014

BR8. Stavrou V., Gritzalis D., Review of "Introduction to Computer and Network Security: Navigating Shades of Gray" (by R. Brooks), Chapman & Hall, 2014. In: Computers and Security, Vol. 46, pp. 173, 2014.

BR7. Stergiopoulos G., Gritzalis D., Review of "A Bug Hunter's Diary" (by T. Klein), No Starch Press, USA, 2011. In Computers and Security, Vol. 43, pp. 188, 2014.

BR6. Tsalis N., Gritzalis D., Review of "Securing Cloud and Mobility: A Practitioner's Guide" (by I. Lim, E.C. Coolidge, P. Hourani), Auerbach Publications, USA 2013 In: Computers & Security, Vol. 45, pp. 305, 2014.

BR5. Virvilis N., Gritzalis D., Review of "Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks" (by M. Mohssen and K.P. Al-Sakib), Auerbach Publications, USA 2013. In: Computers & Security, Vol. 42, pp. 191-192, 2014.

2013

BR4. Soupionis Y., Gritzalis D., Review of "Hacking VoIP: Protocols, Attacks and Countermeasures" (by D. Himanshu), No Starch Press, USA, 2008. In: Computers & Security, Vol. 32, No. 1, pp. 267, 2013.

BR3. Kandias M., Gritzalis D., Review of "Metasploit: The Penetration Tester's Guide" (by M. Aharoni, D. Kearns, J. O'Gorman, D. Kennedy), No Starch Press, 2011. In: Computers & Security, Vol. 32, No. 1, pp. 268-269, 2013.

2012

BR2. B. Tsoumas, D. Gritzalis, Review of "Inside Cyber Warfare: Mapping the Cyber Underworld" (by J. Carr), O’ Reilly, 2011. In: Computers & Security, Vol. 31, No. 6, pp. 801, 2012.

BR1. A. Mylonas, D. Gritzalis, Review of "Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software" (by M. Sikorski and A. Honig), No Starch Press, 2012. Computers & Security, Vol. 31, No 6, pp. 802-803, 2012.