Books

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress and Steve Winterfeld

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice by Jason Andress

Security Metrics, A Beginner’s Guide by Caroline Wong

The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto

Hacking Web Apps: Detecting and Preventing Web Application Security Problems by Mike Shema

Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray and George Kurtz

Linux Pocket Guide, 2nd Edition by Daniel J. Barrett

Thor’s Microsoft Security Bible: A Collection of Practical Security Techniques by Timothy “Thor” Mullen

Windows Sysinternals Administrator’s Reference by Mark Russinovich and Aaron Margosis

Microsoft Windows Operating System Essentials (John Wiley) by Tom Carpenter

Microsoft Log Parser Toolkit: A complete toolkit for Microsoft’s undocumented log analysis tool by Gabriele Giuseppini, Mark Burnett, Jeremy Faircloth, and Dave Kleiman

Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger by Eric Lawrence

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering) by Dawn M. Cappelli, Andrew P. Moore, and Randall F. Trzeciak

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) by Patrick Engebretson

Low Tech Hacking: Street Smarts for Security Professionals by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers and Sean Lowther

Penetration Tester’s Open Source Toolkit, Third Edition by Jeremy Faircloth

Digital Forensics with Open Source Tools  by Cory Altheide and Harlan Carvey

Coding for Penetration Testers: Building Better Tools by Jason Andress and Ryan Linn

Metasploit: The Penetration Tester’s Guide by David Kennedy

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran (Oct 9, 2011)

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics by John Sammons

Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom by Larry Daniel and Lars Daniel

Computer Forensics: Incident Response Essentials by Warren G. Kruse and Jay G. Heiser

Computer Forensics Jumpstart by Michael Solomon, Neil Broom and Diane Barrett

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew Hoog and Katie Strzempka

Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan Carvey

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry by Harlan Carvey

Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard

Windows 7 Inside Out, Deluxe Edition by Ed Bott, Carl Siechert and Craig Stinson

Hardening Cisco Routers (O’Reilly Networking) by Thomas Akin

Building Resilient IP Networks by Kok-Keong Lee, Fung Lim and Beng-Hui Ong

Packet Guide to Routing and Switching by Bruce Hartpence

Network Warrior by Gary A. Donahue

Network Security First-Step (2nd Edition) by Thomas M. Thomas and Donald Stoddard

CCNP Security Secure 642-637 Official Cert Guide by Sean Wilkins and Trey Smith

Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard

Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide by Laura Chappell

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon “Fyodor” Lyon

Nmap 6: Network exploration and security auditing Cookbook by Calderon Pale Paulino

Planning for IPv6 by Silvia Hagen

The Internet of Things: Key Applications and Protocols (by Olivier Hersent, David Boswarthick, and Omar Elloumi) describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M.

Machine Learning for Hackers by Drew Conway and John Myles White

Advertisements

Comments are closed.