- The Beginner’s Guide to Information Security
- Essentials of Cybersecurity
- Essentials of Enterprise Network Security
- The complete WarBerryPi – Everything you need
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress and Steve Winterfeld
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice by Jason Andress
Security Metrics, A Beginner’s Guide by Caroline Wong
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto
Hacking Web Apps: Detecting and Preventing Web Application Security Problems by Mike Shema
Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray and George Kurtz
Linux Pocket Guide, 2nd Edition by Daniel J. Barrett
Thor’s Microsoft Security Bible: A Collection of Practical Security Techniques by Timothy “Thor” Mullen
Windows Sysinternals Administrator’s Reference by Mark Russinovich and Aaron Margosis
Microsoft Windows Operating System Essentials (John Wiley) by Tom Carpenter
Microsoft Log Parser Toolkit: A complete toolkit for Microsoft’s undocumented log analysis tool by Gabriele Giuseppini, Mark Burnett, Jeremy Faircloth, and Dave Kleiman
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger by Eric Lawrence
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering) by Dawn M. Cappelli, Andrew P. Moore, and Randall F. Trzeciak
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) by Patrick Engebretson
Low Tech Hacking: Street Smarts for Security Professionals by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers and Sean Lowther
Penetration Tester’s Open Source Toolkit, Third Edition by Jeremy Faircloth
Digital Forensics with Open Source Tools by Cory Altheide and Harlan Carvey
Coding for Penetration Testers: Building Better Tools by Jason Andress and Ryan Linn
Metasploit: The Penetration Tester’s Guide by David Kennedy
BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali
BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran (Oct 9, 2011)
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics by John Sammons
Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom by Larry Daniel and Lars Daniel
Computer Forensics: Incident Response Essentials by Warren G. Kruse and Jay G. Heiser
Computer Forensics Jumpstart by Michael Solomon, Neil Broom and Diane Barrett
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew Hoog and Katie Strzempka
Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan Carvey
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry by Harlan Carvey
Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard
Windows 7 Inside Out, Deluxe Edition by Ed Bott, Carl Siechert and Craig Stinson
Hardening Cisco Routers (O’Reilly Networking) by Thomas Akin
Building Resilient IP Networks by Kok-Keong Lee, Fung Lim and Beng-Hui Ong
Packet Guide to Routing and Switching by Bruce Hartpence
Network Warrior by Gary A. Donahue
Network Security First-Step (2nd Edition) by Thomas M. Thomas and Donald Stoddard
CCNP Security Secure 642-637 Official Cert Guide by Sean Wilkins and Trey Smith
Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard
Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide by Laura Chappell
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon “Fyodor” Lyon
Nmap 6: Network exploration and security auditing Cookbook by Calderon Pale Paulino
Planning for IPv6 by Silvia Hagen
The Internet of Things: Key Applications and Protocols (by Olivier Hersent, David Boswarthick, and Omar Elloumi) describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M.
Machine Learning for Hackers by Drew Conway and John Myles White