Lilburn Watson, D., Jones, A., (2013), Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements., 880, MA, USA.
Smith, C., Brooks, D., (2013), Security Science: The theory and practice of security. 280, Oxford, UK.
Cubbage, C., Brooks, D., (2012), Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct. 242, Boca Raton
Aly, A (2011) Terrorism and Global Security: Historical and Contemporary Perspectives. Melbourne: Palgrave Macmillan
Clarke, N., Transparent User Authentication Biometrics, RFID and Behavioural Profiling. Springer UK.
Aly, Anne (2010) A Study of Audience Responses to the Media Discourse About the ‘Other’:The Fear of Terrorism Between Australian Muslims and the Broader Community. Lampeter: Edwin Mellen Press
Clark, N (2010) Computer Forensics: A Pocket Guide. IT Governance Publishing.
Armistead, L (2010) Information Operations Matters: Best Practices. Potomac Books, Inc.
Jones, A. and C. Valli (2009). Building a Digital Forensic Laboratory., Butterworth-Heinemann.
Brooks, D. J. (2009). Key concepts in security risk management. Saarbrucken: VDM Verlag. ISBN 978-3-639-18598-0
Furnell, S.M. 2009. Mobile Security: A Pocket Guide. IT Governance Publishing. ISBN 1-84928-020-7.
Sarre, R., Brooks, D., Smith, C., Draper, R., (2013), Emerging Technologies Employed to Abate Crime and to Promote Security. The Routledge Handbook of International Crime and Justice Studies, 327-349, Abingdon.
Brooks, D., (2012), Security threats and risks of Intelligent Building Systems: Protecting facilities from current and emerging vulnerabilities. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 1-16, Hershey, PA, USA, DOI: 10.4018/978-1-4666-2659-1.ch001.
Cook, D.M., (2011) E-Governance of the Forest, Common Property Resource Management, (Eds: Amir Ullah Khan, Mousumi Majumdar), Academic Foundation: New Delhi
Mansoori, M. And Hunt, R (2011) An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Journal of Network Forensics. Journal of Network Forensics. Volume 3 Issue 1, 32-47
Pye, G., Warren, M., and Hutchinson, W., Critical Infrastructure Protection: An Ethical Choice, (Ed: Kristin Klinger) ICT Ethics and Security in the 21st Century: New Developments and Applications, Hershey USA
Shanks, N. (2011) Hold Baggage Screening, (Eds: Sidney Chau) Aviation Security: Challenges and Solutions; Hong Kong
Shanks, N. (2011) Air Cargo Security, (Eds: Sidney Chau) Aviation Security: Challenges and Solutions; Hong Kong
Srinivasan, N., (2011) Security Training, (Eds: Sidney Chau) Aviation Security: Challenges and Solutions; Hong Kong
Williams, P.A.H. (2011). Is the biggest threat to medical information security simply a lack of understanding? In D.P. Hansen, A.J. Maeder, & L.K. Schaper (eds.) Health Informatics: The Transformative Power of Innovation, pp. 179-187. IOS Press: Amsterdam.
Hutchinson, W. (2011) Afghanistan - Information Operations, Influence and the Home Front. (Eds: Future Directions) Afghanistan: The Old-New Geopolitical Blackhole, West Perth, WA, 36-44
Aly, Anne (2010). “Fear, Victimisation and Identity: The Community Victimisation Perspective and Social Inclusion of Australian Muslims.” Muslims in Australia. Yasmeen, S (Ed). Melbourne: Melbourne University Press
Aly, Anne. (2009). “The historical roots of Al Qaeda’s ideology: understanding Ayman al Zawahri’s vision and developing an appropriate response.” Doomed to Repeat: Terrorism and the Lessons of History. Brawley, S (Ed). Canberra: New Academia Press
Aly, Anne. (2009). “Media hegemony, activism and identity: Muslim women re-presenting Muslim women.” Beyond the Hijab Debates: New Conversations on Gender, Race and Religion. Dreher, T and C. Ho (Eds). Cambridge Scholars Press.