SlideShare a Scribd company logo
1 of 9
Download to read offline
Advanced Surveillance: The Complete Manual of Surveillance Training by Peter Jenkins
(Paperback - Oct 2003)
Aggressive Network Self-Defense by Neil R. Wyler, Bruce Potter, and Chris Hurley (Paperback
- Feb. 26, 2005) - Illustrated
Alternate Data Storage Forensics by Amber Schroader, and Tyler Cohen (Paperback - Oct 1,
2007)
Applied Security Visualization by Raffael Marty (Paperback - Aug 11, 2008)
Asterisk Hacking by Ben Jackson, Champ Clark, Johnny Long, and Larry Chaffin (Paperback -
 Jun 29, 2007)
AVIEN Malware Defense Guide for the Enterprise by David Harley, Ken Bechtel, Michael
Blanchard, and Henk K. Diemer (Paperback - Aug. 5, 2007)
Beautiful Security: Leading Security Experts Explain How They Think by Andy Oram, and John
Viega (Paperback - Apr 28, 2009)
Beyond Fear: Thinking Sensibly About Security in an Uncertain World. by Bruce Schneier
(Hardcover - May 4, 2003)
Black Hat Physical Device Security: Exploiting Hardware and Software by Drew Miller
(Hardcover - Oct 29, 2004)
Botnets: The Killer Web App by Craig Schiller, Jim Binkley, Gadi Evron, and Carsten Willems
(Paperback - Feb 15, 2007)
Build Your Own Security Lab: A Field Guide for Network Testing by Michael Gregg
(Paperback - Apr 28, 2008)
Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility by
Andrew Jones, and Craig Valli (Paperback - Oct 7, 2008)
CD and DVD Forensics by Paul Crowley, and Dave Kleiman (Paperback - Mar 12, 2007)
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 by Kimberly Graves
(Paperback - Feb. 27, 2007)
Chained Exploits: Advanced Hacking Attacks from Start to Finish by Andrew Whitaker, Keatron
Evans, and Jack B. Voth (Paperback - Mar 9, 2009)
China's Techno-Warriors: National Security and Strategic Competition from the Nuclear to the
Information Age by Evan A. Feigenbaum (Hardcover - Mar 18, 2003)
Cisco Network Security Troubleshooting Handbook by Mynul Hoda (Paperback - Nov 21, 2005)
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity by
Dale Liu (Paperback - Apr 28, 2009)
Cisco Voice Over IP Security by Stephen Dugan (Paperback - Jul 2005)
CISSP All-in-One Exam Guide, Fifth Edition by Shon Harris (Hardcover - Jan 15, 2010)
CISSP For Dummies by Lawrence C. Miller, and Peter H. Gregory (Paperback - Dec 9, 2009)
CISSP Practice Exams (All-in-One) by Shon Harris (Paperback - Jul 9, 2010)
Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest
Threat by Paul Piccard (Paperback - Sep 19, 2006)
Computer Forensics For Dummies by Linda Volonino, and Reynaldo Anzaldua (Paperback - Oct
13, 2008)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer
Forensics) by EC-Council (Paperback - Sep 17, 2009)
Computer Forensics: Investigating Data and Image Files (Ec-Council Press Series: Computer
Forensics) by EC-Council (Paperback - Sep 16, 2009)
Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press
Series: Computer Forensics) by EC-Council (Paperback - Sep 16, 2009)
Computer Forensics: Investigating Wireless Networks and Devices (C(Computer) Hfi (Hacking
Forensic Investigator) by EC-Council (Paperback - Sep 17, 2009)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series :
Computer Series) by EC-Council (Paperback - Sep 17, 2009)
Computer Security and Penetration Testing by Alfred Basta, and Wolf Halton (Paperback - Aug
31, 2007)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
(2nd Edition) by Edward Skoudis, and Tom Liston (Paperback - Jan 2, 2006)
Crimeware: Understanding New Attacks and Defenses by Markus Jakobsson, and Zulfikar
Ramzan (Paperback - Apr 16, 2008)
Cyber Adversary Characterization: Auditing the Hacker Mind by Tom Parker, Marcus Sachs,
Eric Shaw, and Ed Stroz (Paperback - Jun 2004)
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law
Enforcement, and Prosecutors by Anthony Reyes (Paperback - Feb 26, 2007)
Cyber War: The Next Threat to National Security and What to Do About It by Richard A.
Clarke, and Robert Knake (Hardcover - Apr 20, 2010)
Cyberpower and National Security (National Defense University) by Franklin D. Kramer, Stuart
H. Starr, and Larry Wentz (Paperback - Apr 30, 2009)
Cyberdeterrence and Cyberwar by Martin C. Libicki (Paperback - Nov 25, 2009)
Cyberthreats: The Emerging Fault Lines of the Nation State by Susan W. Brenner (Hardcover -
 Jan 16, 2009)
Cyberwar, Netwar and the Revolution in Military Affairs (part 1) - Hardcover (Sept. 4, 2006) by
Edward F. Halpin, Philippa Trevorrow, David Webb, and Steve Wright
CyberWar, CyberTerror, CyberCrime by Julie E. Mehan (Paperback - Apr 17, 2008)
Department of Defense Sponsored Information Security Research: New Methods for Protecting
Against Cyber Threats by Department of Defense (Hardcover - Jul 17, 2007)
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for
Moving Targets and Data by Terrence V. Lillard (Paperback - Jun 16, 2010)
Digital Triage Forensics: Processing the Digital Crime Scene by Stephen Pearson, and Richard
Watson (Paperback - Jul 12, 2010)
Dissecting the Hack: The F0rb1dd3n Network by Jayson E. Street, Kent Nabors, and Dustin L.
Fritz (Hardcover - Oct. 1, 2009)
Emerging Threat Analysis: From Mischief to Malicious by Michael Gregg, and Brian Baskin
(Paperback - Jan 13, 2007)
Encyclopedia of Cybercrime by Samuel C. McQuade III (Hardcover - Nov 30, 2008)
End-to-End Network Security: Defense-in-Depth by Omar Santos (Paperback - Sep 3, 2007)
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management
Countermeasures by Brian Contos (Paperback - Jan 7, 2007)
Ethical Hacking and Countermeasures: Attack Phases (Ec-Council Press Series: Certified Ethical
Hacker) by EC-Council (Paperback - Sep 22, 2009)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (C/ E H: Certified
Ethical Hacker) by EC-Council (Paperback - Sep 24, 2009)
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (Ec-Council Press
Series: Certified Ethical Hacker) by EC-Council (Paperback - Sep 22, 2009)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (C/ E H: Certified Ethical
Hacker) by EC-Council (Paperback - Sep 24, 2009)
Ethical Hacking and Countermeasures: Web Applications and Data Servers (Ec-Council Press
Series) by EC-Council (Paperback - Sep 24, 2009)
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed) - Paperback
(July 18, 2005) by Victor Oppleman, Oliver Friedrichs, and Brett Watson
Extrusion Detection: Security Monitoring for Internal Intrusions - Paperback (Nov. 18, 2005) by
Richard Bejtlich
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet by
Joseph Menn (Hardcover - Jan 26, 2010)
File System Forensic Analysis by Brian Carrier (Paperback - Mar 27, 2005)
Forensic Discovery by Dan Farmer, and Wietse Venema (Paperback - Dec 28, 2009)
Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, and Pedram
Amini (Paperback - Jul 9, 2007)
GFI Network Security and PCI Compliance Power Tools by Brien Posey (Paperback - Sep 22,
2008)
Google Hacking for Penetration Testers by Johnny Long (Paperback - Nov. 2, 2007)
Google Hacking for Penetration Testers, Volume 2 by Johnny Long (Kindle Edition - Nov. 2,
2007) - Kindle Book
Googling Security: How Much Does Google Know About You? by Greg Conti (Paperback - Oct
20, 2008)
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook by Shon Harris, Allen
Harper, Chris Eagle, and Jonathan Ness (Paperback - Dec 20, 2007)
Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network by
Michael Gregg (Paperback - Jan 10, 2007)
Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson (Paperback - Jan 11, 2008)
Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, and Brett Hardin
(Paperback - Sept. 10, 2009)
Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers, and Matthew
G Devost (Paperback - Dec 1, 2004)
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions - Paperback (Dec. 15,
2005) by Andrew Vladimirov
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
by Aaron Philipp, David Cowen, and Chris Davis (Paperback - Sep 10, 2009)
Hacking Exposed Linux, 3rd Edition by ISECOM (Paperback - July 15, 2008)
Hacking Exposed Malware & Rootkits Secrets & Solutions by Michael Davis, Sean Bodmer, and
Aaron LeMasters (Paperback - Sep 23, 2009)
Hacking Exposed Network Security Secrets and Solutions, Sixth Edition by Stuart McClure, Joel
Scambray, and George Kurtz (Paperback - Jan. 5, 2009)
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by David Endler and Mark
Collier (Paperback - Nov. 28, 2006)
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings,
Himanshu Dwivedi, Zane Lackey, and Jesse Burns (Paperback - Dec 17, 2007)
Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) by Joel Scambray, Mike
Shema, and Caleb Sima (Paperback - Jun 5, 2006)
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
by Joel Scambray (Paperback - Dec. 4, 2007)
Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, and
Vincent Liu (Paperback - Mar 26, 2007)
Hacking For Dummies by Kevin Beaver (Paperback - Jan. 12, 2010)
Hacking the Human by Ian Mann (Hardcover - Nov 1, 2008)
Hacking VoIP: Protocols, Attacks, and Countermeasures by Himanshu Dwivedi (Paperback -
 Mar 21, 2008)
Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) by Kevin Beaver,
Peter T. Davis, and Devin K. Akin (Paperback - Sept. 13, 2005)
Hacktivism and Cyberwars: Rebels with a Cause? - Hardcover (Aug. 6, 2004) by Tim Jordan and
Paul Taylor
Hardening Linux by James Turnbull (Paperback - Feb 1, 2005)
Hardening Network Infrastructure by Wesley J. Noonan (Paperback - May 7, 2004)
Hardening Windows, Second Edition by Jonathan Hassell (Paperback - Jun 2, 2010)
Honeypots for Windows (The Experts Voice) by Roger A. Grimes (Paperback - Feb 14, 2005)
Honeypots: Tracking Hackers by Lance Spitzner (Paperback - Sep 20, 2002)
Host Integrity Monitoring Using Osiris and Samhain by Brian Wotring (Paperback - May 1,
2005)
How to Cheat at Configuring Open Source Security Tools by Michael Gregg, Eric Seagren,
Angela Orebaugh, and Matt Jonkman (Paperback - May 28, 2007)
How to Cheat at Securing a Wireless Network by Chris Hurley, and Jan Kanclirz Jr. (Paperback -
 Oct 5, 2006)
How to Cheat at Securing Linux by James Stanger (Paperback - Nov 13, 2007)
How to Cheat at Securing Your Network (How to Cheat) by Ido Dubrawsky (Paperback - Oct
16, 2007)
InfoSec Career Hacking: Sell Your Skillz, Not Your Soul by Aaron W. Bayles, Chris Hurley,
Johnny Long, and Ed Brindley (Paperback - Apr 1, 2005)
InfoSecurity 2008 Threat Analysis by Craig Schiller, Seth Fogie, Colby DeRodeff, and Michael
Gregg (Paperback - Nov 12, 2007)
Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr (Paperback - Dec 15,
2009)
Inside Network Perimeter Security (2nd Edition) by Stephen Northcutt, Lenny Zeltser, Scott
Winters, and Karen Kent (Paperback - Mar 14, 2005)
Inside the SPAM Cartel: By Spammer-X by Spammer-X., Jeffrey Posluns (Editor), and Stu
Sjouwerman (Foreword) (Paperback - Nov 27, 2004)
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft by Eric Cole, and
Sandra Ring (Paperback - Mar 15, 2006)
Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash
(Paperback - Apr 26, 2005)
Intrusion Prevention Fundamentals by Earl Carter, and Jonathan Hogue (Paperback - Jan 28,
2006)
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets by Jonathan A.
Zdziarski (Paperback - Sep 12, 2008)
IPv6 Security by Scott Hogg, and Eric Vyncke (Paperback - Dec 21, 2008)
Joomla! Web Security by Tom Canavan (Paperback - Oct 15, 2008)
Kismet Hacking by Brad Haines, Frank Thornton, and Michael Schearer (Paperback - Jun 25,
2008)
Know Your Enemy: Learning about Security Threats (2nd Edition) by Honeynet Project The
(Paperback - May 27, 2004)
LAN Switch Security: What Hackers Know About Your Switches by Eric Vyncke, and
Christopher Paggen (Paperback - Sep 16, 2007)
Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical
Hackers & IT Security Experts by Ali Jahangiri (Paperback - Oct 21, 2009)
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit by Ryan R. Kubasiak, Sean
Morrissey, and Jesse Varsalone (Paperback - Dec 8, 2008)
Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin, Eoghan
Casey, and James M. Aquilina (Paperback - Jun 30, 2008)
Malware: Fighting Malicious Code by Ed Skoudis, and Lenny Zeltser (Paperback - Nov 17,
2003)
Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula (Paperback - Oct
29, 2010)
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals by
Constantine Photopoulos (Paperback - Apr 18, 2008)
Managing Information Security by John R. Vacca (Paperback - Mar 29, 2010)
Managing Security with Snort and IDS Tools by Christopher Gerg, and Kerry J. Cox (Paperback
- Aug 2004)
Mastering Windows Network Forensics and Investigation by Steven Anson, and Steve Bunting
(Paperback - Apr 2, 2007)
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research by
David Maynor (Paperback - Oct 2, 2007)
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices by Max
Schubert (Paperback - Jun 2, 2008)
Nessus Network Auditing, Second Edition by Mark Carey (Paperback - May 27, 2008)
Netcat Power Tools by Jan Kanclirz, and Brian Baskin (Paperback - Jun 27, 2008)
Network and System Security by John R. Vacca (Paperback - Mar 29, 2010)
Network Security Architectures by Sean Convery (Hardcover - Apr 29, 2004)
Network Security Assessment: From Vulnerability to Patch by Steve Manzuik, Andre Gold, and
Chris Gatford (Paperback - Nov 7, 2006)
Network Security Assessment: Know Your Network by Chris McNab (Paperback - Nov 1, 2007)
Network Security Auditing (Networking Technology: Security) by Chris Jackson (Paperback -
 Jun 12, 2010)
Network Warrior: Everything you need to know that wasn't on the CCNA exam by Gary A.
Donahue (Paperback - Jun 1, 2007)
Next Generation SSH2 Implementation: Securing Data in Motion by Max Caceres, Aaron E.
Earle, Devin Ganger, and Wipul Jayawickrama (Paperback - Nov 28, 2008)
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas
Wilhelm, and Jason Andress (Paperback - Oct 8, 2010)
Nmap in the Enterprise: Your Guide to Network Scanning by Angela Orebaugh, and Becky
Pinkard (Paperback - Mar 14, 2008)
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by
Johnny Long (Paperback - Feb. 21, 2008)
Official Certified Ethical Hacker Review Guide by Steven DeFino and Barry Kaufman
(Paperback - Nov. 9, 2009)
Open Source Fuzzing Tools by Noam Rathaus, and Gadi Evron (Paperback - Dec 28, 2007)
OS X Exploits and Defense: Own it...Just Like Windows or Linux! by Paul Baccas, Kevin
Finisterre, Larry H., and David Harley (Paperback - Apr 25, 2008)
OS X for Hackers at Heart by Bruce Potter, Chris Hurley, Johnny Long, and Tom Owad
(Paperback - Nov. 19, 2005) - Illustrated
OSSEC Host-Based Intrusion Detection Guide by Andrew Hay, Daniel Cid, and Rory Bray
(Paperback - Mar 17, 2008)
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
by Dr. Anton Chuvakin, and Branden R. Williams (Paperback - Dec 15, 2009)
Penetration Tester's Open Source Toolkit, Vol. 2 - Paperback (Nov. 30, 2007) by Jeremy
Faircloth and Chris Hurley
Penetration Testing and Network Defense by Andrew Whitaker, and Daniel Newman (Paperback
- Nov 10, 2005)
Penetration Testing: Communication Media Testing (Ec-Council Press Series: Certified Security
Analyst) by EC-Council (Paperback - Jun 23, 2010)
Penetration Testing: Network & Perimeter Testing (Ec-Council/ Certified Security Analyst) by
EC-Council (Paperback - May 4, 2010)
Penetration Testing: Network Threat Testing (Ec-Council Press Series: Certified Security
Analyst) by EC-Council (Paperback - Jun 23, 2010)
Penetration Testing: Procedures & Methodologies (Ec-Council/ Certified Security Analyst) by
EC-Council (Paperback - May 4, 2010)
Penetration Testing: Security Analysis (Penetration Testing: Ec-Council/ Press Series: Certified
Security Analyst) by EC-Council (Paperback - Apr 5, 2010)
Perfect Password: Selection, Protection, Authentication by Mark Burnett, and Dave Kleiman
(Paperback - Dec 25, 2005)
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring by
Harlan Carvey (Paperback - Dec 26, 2007)
Phishing Exposed by Lance James (Paperback - Jan 20, 2006)
Practical Cryptography by Niels Ferguson, and Bruce Schneier (Paperback - Mar 28, 2003)
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century - Paperback
(July 4, 2009) by Ryan Trost
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security by Josh
Shaul, and Aaron Ingram (Paperback - Nov 26, 2007)
Practical VoIP Security by Thomas Porter, Jan Kanclirz Jr., and Brian Baskin (Paperback - Jun
10, 2006)
Professional Pen Testing for Web Applications (Programmer to Programmer) by Andres Andreu
(Paperback - Jul 5, 2006)
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab by Thomas
Wilhelm (Paperback - Aug 28, 2009)
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking by
Raoul Chiesa, Stefania Ducci, and Silvio Ciappi (Paperback - Dec 11, 2008)
Real Digital Forensics: Computer Security and Incident Response by Keith J. Jones, Richard
Bejtlich, and Curtis W. Rose (Paperback - Oct 3, 2005)
Reversing: Secrets of Reverse Engineering by Eldad Eilam (Paperback - Apr 15, 2005)
Rootkits for Dummies (For Dummies (Computer/Tech)) by Larry Stevenson, and Nancy Altholz
(Paperback - Jan 30, 2007)
Rootkits: Subverting the Windows Kernel by Greg Hoglund, and Jamie Butler (Paperback - Aug
1, 2005)
Router Security Strategies: Securing IP Network Traffic Planes by Gregg Schudel, and David J.
Smith (Paperback - Jan 8, 2008)
Sarbanes-Oxley IT Compliance Using Open Source Tools, Second Edition by Christian B Lahti,
and Roderick Peterson (Paperback - Dec 28, 2007)
Sarbanes-Oxley For Dummies by Jill Gilbert Welytok (Paperback - Feb 26, 2008)
Schneier on Security by Bruce Schneier (Hardcover - Sep 29, 2008)
Secrets and Lies: Digital Security in a Networked World by Bruce Schneier (Paperback- Jan 30,
2004)
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in
the 21st Century by Christopher Burgess (Paperback - Mar 19, 2008)
Secure Your Network for Free by Eric Seagren (Paperback - Feb 15, 2007)
Securing IM and P2P Applications for the Enterprise by Marcus Sachs, Paul Piccard, Brian
Baskin, and George Spillman (Paperback - May 1, 2005)
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures by Peter Thermos, and
Ari Takanen (Paperback - Aug 11, 2007)
Security Data Visualization: Graphical Techniques for Network Analysis by Greg Conti
(Paperback - Oct 1, 2007)
Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson
(Hardcover - Apr 14, 2008)
Security Log Management: Identifying Patterns in the Chaos by Jacob Babbin, Dave Kleiman,
Everett F. Carter Jr., and Jeremy Faircloth (Paperback - Apr 13, 2006)
Security Metrics: Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith (Paperback - Apr
5, 2007)
Security Monitoring with Cisco Security MARS by Gary Halleen, and Greg Kellogg (Paperback
- Jul 16, 2007)
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks by Chris
Fry, and Martin Nystrom (Paperback - Feb 16, 2009)
Security Threat Mitigation and Response: Understanding Cisco Security MARS by Dale Tesch,
and Greg Abelar (Paperback - Oct 8, 2006)
Security Warrior by Cyrus Peikari, and Anton Chuvakin (Paperback - Feb 1, 2004)
Self-Defending Networks: The Next Generation of Network Security by Duane De Capite
(Paperback - Sep 10, 2006)
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal
Zalewski (Paperback - Apr 15, 2005)
Snort IDS and IPS Toolkit (Jay Beale's Open Source Security) by Brian Caswell, Jay Beale, and
Andrew Baker (Paperback - Feb 1, 2007)
Social Engineering: The Art of Human Hacking by Christopher Hadnagy (Paperback - Dec 8,
2010)
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for
Security Professionals by James C Foster (Paperback - Apr 26, 2005)
Software Piracy Exposed by Paul Craig, and Mark Burnett (Paperback - May 1, 2005)
Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even
Know You Encounter Every Day by Ira Winkler (Hardcover - Apr 8, 2005)
SQL Hacks by Andrew Cumming, and Gordon Russell (Paperback - Nov 21, 2006)
SQL Injection Attacks and Defense by Justin Clarke (Paperback - May 15, 2009)
SQL Server Forensic Analysis by Kevvie Fowler (Paperback - Dec 26, 2008)
Steal This Computer Book 4.0: What They Won't Tell You about the Internet by Wallace Wang
(Paperback - Apr. 15, 2006)
Stealing the Network: How to Own a Continent by FX, Paul Craig, Joe Grand, and Tim Mullen
(Paperback - May 2004)
Stealing the Network: How to Own a Shadow by Johnny Long, Timothy Mullen, and Ryan
Russell (Paperback - Feb 15, 2007)
Stealing the Network: How to Own an Identity by Ryan Russell, Riley Eller, Jay Beale, and
Chris Hurley (Paperback - May 1, 2005)
Stealing the Network: How to Own the Box by Ryan Russell, Ido Dubrawsky, FX, and Joe
Grand (Paperback - May 29, 2003)
Surviving Cyberwar by Richard Stiennon (Paperback - Jul 16, 2010)
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook by
Jack Wiles (Paperback - Oct 23, 2007)
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators by Jack
Wiles, Johnny Long (Paperback - Mar 26, 2007)
Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The
Critical Infrastructure by Jack Wiles (Paperback - Jul 30, 2008)
The Art of Computer Virus Research and Defense by Peter Szor (Paperback - Feb 13, 2005)
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William
L. Simon, and Steve Wozniak (Paperback - Oct 17, 2003)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by Kevin D. Mitnick, and William L. Simon (Paperback - Dec 27, 2005)
The Art of Software Security Testing: Identifying Software Security Flaws by Chris Wysopal,
Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin (Paperback - Nov 27, 2006)
The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein (Hardcover - July 28, 2008)
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L.
Krutz, and Russell Dean Vines (Hardcover - Oct 22, 2007)
The Dark Visitor (paperback) (Unknown Binding - Jan 1, 2007)
The Database Hacker's Handbook: Defending Database Servers by David Litchfield, Chris
Anley, John Heasman, and Bill Grindlay (Paperback - Jul 14, 2005)
The dotCrime Manifesto: How to Stop Internet Crime by Phillip Hallam-Baker (Hardcover - Jan
8, 2008)
The Ethical Hack: A Framework for Business Value Penetration Testing by James S. Tiller
(Hardcover - Sep 29, 2004)
The Insider: A True Story by Dan Verton (Hardcover - Jun 24, 2005)
The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems
Audit and Assessments by Craig Wright (Paperback - Jul 4, 2008)
The Mezonic Agenda: Hacking the Presidency by Herbert Thomson (Paperback - Oct 7, 2004)
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know by
John Viega (Paperback - Jun 19, 2009)
The New School of Information Security by Adam Shostack, and Andrew Stewart (Hardcover -
 Apr 5, 2008)
The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator by
Dave Kleiman (Paperback - Oct 8, 2007)
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System by Bill Blunden
(Paperback - May 4, 2009)
The Tao of Network Security Monitoring: Beyond Intrusion Detection - Paperback (July 22,
2004) by Richard Bejtlich
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by
Dafydd Stuttard and Marcus Pinto (Paperback - Oct. 22, 2007)
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp and
Kevin Mitnick (Paperback - Sept. 22, 2009)
UNIX and Linux Forensic Analysis DVD Toolkit by Chris Pogue, Cory Altheide, and Todd
Haverkos (Paperback - Jun 30, 2008)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection by Niels Provos, and Thorsten
Holz (Paperback - Jul 26, 2007)
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments by
Diane Barrett, and Greg Kipper (Paperback - Jun 1, 2010)
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability,
Forensic Analysis, and Honeypotting by John Hoopes (Paperback - Dec 26, 2008)
Voice over IP Security by Patrick Park (Paperback - Sep 19, 2008)
WarDriving and Wireless Penetration Testing by Chris Hurley, Russ Rogers, Frank Thornton,
and Brian Baker (Paperback - Jan 15, 2007)
Web Application Vulnerabilities: Detect, Exploit, Prevent by Steven Palmer (Paperback - Dec.
28, 2007)
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast by Paco Hope,
and Ben Walther (Paperback - Oct 17, 2008)
Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition) by Andrew Vladimirov, Konstantin
V. Gavrilenko, and Andrei A. Mikhailovsky (Paperback - Jul 28, 2008)
Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan A. Carvey (Paperback -
 Jun 11, 2009)
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security) by
Angela Orebaugh, Gilbert Ramirez, and Jay Beale (Paperback - Feb 14, 2007)
Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide by
Laura Chappell, and Gerald Combs (Paperback - Mar 15, 2010)
Writing Security Tools and Exploits - Paperback - Illustrated (Mar. 11, 2006) by James C. Foster
XSS Attacks: Cross Site Scripting Exploits and Defense by Seth Fogie, Jeremiah Grossman,
Robert Hansen, and Anton Rager (Paperback - May 15, 2007)
Zen and the Art of Information Security by Ira Winkler (Paperback - Mar 1, 2007)
Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction) by Rob Shein, David Litchfield, and
Marcus Sachs (Paperback - Aug 4, 2004)
Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks
Steal Your Money and Identity by Byron Acohido, and Jon Swartz (Hardcover - Apr 1, 2008)

More Related Content

More from Mark Johnson

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
Defcon 18-geers-baltic-cyber-shield
Defcon 18-geers-baltic-cyber-shieldDefcon 18-geers-baltic-cyber-shield
Defcon 18-geers-baltic-cyber-shieldMark Johnson
 
Yuferitsyn, anton information
Yuferitsyn, anton informationYuferitsyn, anton information
Yuferitsyn, anton informationMark Johnson
 
Yuferitsyn, anton complaint
Yuferitsyn, anton complaintYuferitsyn, anton complaint
Yuferitsyn, anton complaintMark Johnson
 
Svechinskaya, kristina and rastorguev, stanislav
Svechinskaya, kristina and rastorguev, stanislavSvechinskaya, kristina and rastorguev, stanislav
Svechinskaya, kristina and rastorguev, stanislavMark Johnson
 
Sorokin, alexandr information 01
Sorokin, alexandr information 01Sorokin, alexandr information 01
Sorokin, alexandr information 01Mark Johnson
 
Sorokin, alexandr information
Sorokin, alexandr informationSorokin, alexandr information
Sorokin, alexandr informationMark Johnson
 
Sorokin, alexandr complaint
Sorokin, alexandr complaintSorokin, alexandr complaint
Sorokin, alexandr complaintMark Johnson
 
Pakhomova, margarita complaint
Pakhomova, margarita complaintPakhomova, margarita complaint
Pakhomova, margarita complaintMark Johnson
 
Semenov, artem et al complaint
Semenov, artem et al complaintSemenov, artem et al complaint
Semenov, artem et al complaintMark Johnson
 
Rafikova, sabina complaint
Rafikova, sabina complaintRafikova, sabina complaint
Rafikova, sabina complaintMark Johnson
 
Oprea, marina et al complaint
Oprea, marina et al complaintOprea, marina et al complaint
Oprea, marina et al complaintMark Johnson
 
Opinca, victoria and turuta, alina complaint
Opinca, victoria and turuta, alina complaintOpinca, victoria and turuta, alina complaint
Opinca, victoria and turuta, alina complaintMark Johnson
 
Miroshnichenko, maxim and sidorenko, julia
Miroshnichenko, maxim and sidorenko, juliaMiroshnichenko, maxim and sidorenko, julia
Miroshnichenko, maxim and sidorenko, juliaMark Johnson
 
Misyura, marina complaint
Misyura, marina complaintMisyura, marina complaint
Misyura, marina complaintMark Johnson
 
Klepikova, yulia and demina, natalia complaint
Klepikova, yulia and demina, natalia complaintKlepikova, yulia and demina, natalia complaint
Klepikova, yulia and demina, natalia complaintMark Johnson
 
Karasev, ilya complaint
Karasev, ilya complaintKarasev, ilya complaint
Karasev, ilya complaintMark Johnson
 
Kireev, alexander complaint
Kireev, alexander complaintKireev, alexander complaint
Kireev, alexander complaintMark Johnson
 

More from Mark Johnson (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Parlementariers
ParlementariersParlementariers
Parlementariers
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
Defcon 18-geers-baltic-cyber-shield
Defcon 18-geers-baltic-cyber-shieldDefcon 18-geers-baltic-cyber-shield
Defcon 18-geers-baltic-cyber-shield
 
Yuferitsyn, anton information
Yuferitsyn, anton informationYuferitsyn, anton information
Yuferitsyn, anton information
 
Yuferitsyn, anton complaint
Yuferitsyn, anton complaintYuferitsyn, anton complaint
Yuferitsyn, anton complaint
 
Svechinskaya, kristina and rastorguev, stanislav
Svechinskaya, kristina and rastorguev, stanislavSvechinskaya, kristina and rastorguev, stanislav
Svechinskaya, kristina and rastorguev, stanislav
 
Sorokin, alexandr information 01
Sorokin, alexandr information 01Sorokin, alexandr information 01
Sorokin, alexandr information 01
 
Sorokin, alexandr information
Sorokin, alexandr informationSorokin, alexandr information
Sorokin, alexandr information
 
Sorokin, alexandr complaint
Sorokin, alexandr complaintSorokin, alexandr complaint
Sorokin, alexandr complaint
 
Pakhomova, margarita complaint
Pakhomova, margarita complaintPakhomova, margarita complaint
Pakhomova, margarita complaint
 
Semenov, artem et al complaint
Semenov, artem et al complaintSemenov, artem et al complaint
Semenov, artem et al complaint
 
Rafikova, sabina complaint
Rafikova, sabina complaintRafikova, sabina complaint
Rafikova, sabina complaint
 
Oprea, marina et al complaint
Oprea, marina et al complaintOprea, marina et al complaint
Oprea, marina et al complaint
 
Opinca, victoria and turuta, alina complaint
Opinca, victoria and turuta, alina complaintOpinca, victoria and turuta, alina complaint
Opinca, victoria and turuta, alina complaint
 
Miroshnichenko, maxim and sidorenko, julia
Miroshnichenko, maxim and sidorenko, juliaMiroshnichenko, maxim and sidorenko, julia
Miroshnichenko, maxim and sidorenko, julia
 
Misyura, marina complaint
Misyura, marina complaintMisyura, marina complaint
Misyura, marina complaint
 
Klepikova, yulia and demina, natalia complaint
Klepikova, yulia and demina, natalia complaintKlepikova, yulia and demina, natalia complaint
Klepikova, yulia and demina, natalia complaint
 
Karasev, ilya complaint
Karasev, ilya complaintKarasev, ilya complaint
Karasev, ilya complaint
 
Kireev, alexander complaint
Kireev, alexander complaintKireev, alexander complaint
Kireev, alexander complaint
 

Infosec books

  • 1. Advanced Surveillance: The Complete Manual of Surveillance Training by Peter Jenkins (Paperback - Oct 2003) Aggressive Network Self-Defense by Neil R. Wyler, Bruce Potter, and Chris Hurley (Paperback - Feb. 26, 2005) - Illustrated Alternate Data Storage Forensics by Amber Schroader, and Tyler Cohen (Paperback - Oct 1, 2007) Applied Security Visualization by Raffael Marty (Paperback - Aug 11, 2008) Asterisk Hacking by Ben Jackson, Champ Clark, Johnny Long, and Larry Chaffin (Paperback - Jun 29, 2007) AVIEN Malware Defense Guide for the Enterprise by David Harley, Ken Bechtel, Michael Blanchard, and Henk K. Diemer (Paperback - Aug. 5, 2007) Beautiful Security: Leading Security Experts Explain How They Think by Andy Oram, and John Viega (Paperback - Apr 28, 2009) Beyond Fear: Thinking Sensibly About Security in an Uncertain World. by Bruce Schneier (Hardcover - May 4, 2003) Black Hat Physical Device Security: Exploiting Hardware and Software by Drew Miller (Hardcover - Oct 29, 2004) Botnets: The Killer Web App by Craig Schiller, Jim Binkley, Gadi Evron, and Carsten Willems (Paperback - Feb 15, 2007) Build Your Own Security Lab: A Field Guide for Network Testing by Michael Gregg (Paperback - Apr 28, 2008) Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility by Andrew Jones, and Craig Valli (Paperback - Oct 7, 2008) CD and DVD Forensics by Paul Crowley, and Dave Kleiman (Paperback - Mar 12, 2007) CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 by Kimberly Graves (Paperback - Feb. 27, 2007) Chained Exploits: Advanced Hacking Attacks from Start to Finish by Andrew Whitaker, Keatron Evans, and Jack B. Voth (Paperback - Mar 9, 2009) China's Techno-Warriors: National Security and Strategic Competition from the Nuclear to the Information Age by Evan A. Feigenbaum (Hardcover - Mar 18, 2003) Cisco Network Security Troubleshooting Handbook by Mynul Hoda (Paperback - Nov 21, 2005) Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity by Dale Liu (Paperback - Apr 28, 2009) Cisco Voice Over IP Security by Stephen Dugan (Paperback - Jul 2005) CISSP All-in-One Exam Guide, Fifth Edition by Shon Harris (Hardcover - Jan 15, 2010) CISSP For Dummies by Lawrence C. Miller, and Peter H. Gregory (Paperback - Dec 9, 2009) CISSP Practice Exams (All-in-One) by Shon Harris (Paperback - Jul 9, 2010) Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat by Paul Piccard (Paperback - Sep 19, 2006) Computer Forensics For Dummies by Linda Volonino, and Reynaldo Anzaldua (Paperback - Oct 13, 2008) Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics) by EC-Council (Paperback - Sep 17, 2009) Computer Forensics: Investigating Data and Image Files (Ec-Council Press Series: Computer Forensics) by EC-Council (Paperback - Sep 16, 2009)
  • 2. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics) by EC-Council (Paperback - Sep 16, 2009) Computer Forensics: Investigating Wireless Networks and Devices (C(Computer) Hfi (Hacking Forensic Investigator) by EC-Council (Paperback - Sep 17, 2009) Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series) by EC-Council (Paperback - Sep 17, 2009) Computer Security and Penetration Testing by Alfred Basta, and Wolf Halton (Paperback - Aug 31, 2007) Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) by Edward Skoudis, and Tom Liston (Paperback - Jan 2, 2006) Crimeware: Understanding New Attacks and Defenses by Markus Jakobsson, and Zulfikar Ramzan (Paperback - Apr 16, 2008) Cyber Adversary Characterization: Auditing the Hacker Mind by Tom Parker, Marcus Sachs, Eric Shaw, and Ed Stroz (Paperback - Jun 2004) Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Anthony Reyes (Paperback - Feb 26, 2007) Cyber War: The Next Threat to National Security and What to Do About It by Richard A. Clarke, and Robert Knake (Hardcover - Apr 20, 2010) Cyberpower and National Security (National Defense University) by Franklin D. Kramer, Stuart H. Starr, and Larry Wentz (Paperback - Apr 30, 2009) Cyberdeterrence and Cyberwar by Martin C. Libicki (Paperback - Nov 25, 2009) Cyberthreats: The Emerging Fault Lines of the Nation State by Susan W. Brenner (Hardcover - Jan 16, 2009) Cyberwar, Netwar and the Revolution in Military Affairs (part 1) - Hardcover (Sept. 4, 2006) by Edward F. Halpin, Philippa Trevorrow, David Webb, and Steve Wright CyberWar, CyberTerror, CyberCrime by Julie E. Mehan (Paperback - Apr 17, 2008) Department of Defense Sponsored Information Security Research: New Methods for Protecting Against Cyber Threats by Department of Defense (Hardcover - Jul 17, 2007) Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data by Terrence V. Lillard (Paperback - Jun 16, 2010) Digital Triage Forensics: Processing the Digital Crime Scene by Stephen Pearson, and Richard Watson (Paperback - Jul 12, 2010) Dissecting the Hack: The F0rb1dd3n Network by Jayson E. Street, Kent Nabors, and Dustin L. Fritz (Hardcover - Oct. 1, 2009) Emerging Threat Analysis: From Mischief to Malicious by Michael Gregg, and Brian Baskin (Paperback - Jan 13, 2007) Encyclopedia of Cybercrime by Samuel C. McQuade III (Hardcover - Nov 30, 2008) End-to-End Network Security: Defense-in-Depth by Omar Santos (Paperback - Sep 3, 2007) Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures by Brian Contos (Paperback - Jan 7, 2007) Ethical Hacking and Countermeasures: Attack Phases (Ec-Council Press Series: Certified Ethical Hacker) by EC-Council (Paperback - Sep 22, 2009) Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (C/ E H: Certified Ethical Hacker) by EC-Council (Paperback - Sep 24, 2009) Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (Ec-Council Press Series: Certified Ethical Hacker) by EC-Council (Paperback - Sep 22, 2009)
  • 3. Ethical Hacking and Countermeasures: Secure Network Infrastructures (C/ E H: Certified Ethical Hacker) by EC-Council (Paperback - Sep 24, 2009) Ethical Hacking and Countermeasures: Web Applications and Data Servers (Ec-Council Press Series) by EC-Council (Paperback - Sep 24, 2009) Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed) - Paperback (July 18, 2005) by Victor Oppleman, Oliver Friedrichs, and Brett Watson Extrusion Detection: Security Monitoring for Internal Intrusions - Paperback (Nov. 18, 2005) by Richard Bejtlich Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet by Joseph Menn (Hardcover - Jan 26, 2010) File System Forensic Analysis by Brian Carrier (Paperback - Mar 27, 2005) Forensic Discovery by Dan Farmer, and Wietse Venema (Paperback - Dec 28, 2009) Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, and Pedram Amini (Paperback - Jul 9, 2007) GFI Network Security and PCI Compliance Power Tools by Brien Posey (Paperback - Sep 22, 2008) Google Hacking for Penetration Testers by Johnny Long (Paperback - Nov. 2, 2007) Google Hacking for Penetration Testers, Volume 2 by Johnny Long (Kindle Edition - Nov. 2, 2007) - Kindle Book Googling Security: How Much Does Google Know About You? by Greg Conti (Paperback - Oct 20, 2008) Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness (Paperback - Dec 20, 2007) Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network by Michael Gregg (Paperback - Jan 10, 2007) Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson (Paperback - Jan 11, 2008) Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, and Brett Hardin (Paperback - Sept. 10, 2009) Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers, and Matthew G Devost (Paperback - Dec 1, 2004) Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions - Paperback (Dec. 15, 2005) by Andrew Vladimirov Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Aaron Philipp, David Cowen, and Chris Davis (Paperback - Sep 10, 2009) Hacking Exposed Linux, 3rd Edition by ISECOM (Paperback - July 15, 2008) Hacking Exposed Malware & Rootkits Secrets & Solutions by Michael Davis, Sean Bodmer, and Aaron LeMasters (Paperback - Sep 23, 2009) Hacking Exposed Network Security Secrets and Solutions, Sixth Edition by Stuart McClure, Joel Scambray, and George Kurtz (Paperback - Jan. 5, 2009) Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by David Endler and Mark Collier (Paperback - Nov. 28, 2006) Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, Zane Lackey, and Jesse Burns (Paperback - Dec 17, 2007) Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) by Joel Scambray, Mike Shema, and Caleb Sima (Paperback - Jun 5, 2006)
  • 4. Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray (Paperback - Dec. 4, 2007) Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, and Vincent Liu (Paperback - Mar 26, 2007) Hacking For Dummies by Kevin Beaver (Paperback - Jan. 12, 2010) Hacking the Human by Ian Mann (Hardcover - Nov 1, 2008) Hacking VoIP: Protocols, Attacks, and Countermeasures by Himanshu Dwivedi (Paperback - Mar 21, 2008) Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) by Kevin Beaver, Peter T. Davis, and Devin K. Akin (Paperback - Sept. 13, 2005) Hacktivism and Cyberwars: Rebels with a Cause? - Hardcover (Aug. 6, 2004) by Tim Jordan and Paul Taylor Hardening Linux by James Turnbull (Paperback - Feb 1, 2005) Hardening Network Infrastructure by Wesley J. Noonan (Paperback - May 7, 2004) Hardening Windows, Second Edition by Jonathan Hassell (Paperback - Jun 2, 2010) Honeypots for Windows (The Experts Voice) by Roger A. Grimes (Paperback - Feb 14, 2005) Honeypots: Tracking Hackers by Lance Spitzner (Paperback - Sep 20, 2002) Host Integrity Monitoring Using Osiris and Samhain by Brian Wotring (Paperback - May 1, 2005) How to Cheat at Configuring Open Source Security Tools by Michael Gregg, Eric Seagren, Angela Orebaugh, and Matt Jonkman (Paperback - May 28, 2007) How to Cheat at Securing a Wireless Network by Chris Hurley, and Jan Kanclirz Jr. (Paperback - Oct 5, 2006) How to Cheat at Securing Linux by James Stanger (Paperback - Nov 13, 2007) How to Cheat at Securing Your Network (How to Cheat) by Ido Dubrawsky (Paperback - Oct 16, 2007) InfoSec Career Hacking: Sell Your Skillz, Not Your Soul by Aaron W. Bayles, Chris Hurley, Johnny Long, and Ed Brindley (Paperback - Apr 1, 2005) InfoSecurity 2008 Threat Analysis by Craig Schiller, Seth Fogie, Colby DeRodeff, and Michael Gregg (Paperback - Nov 12, 2007) Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr (Paperback - Dec 15, 2009) Inside Network Perimeter Security (2nd Edition) by Stephen Northcutt, Lenny Zeltser, Scott Winters, and Karen Kent (Paperback - Mar 14, 2005) Inside the SPAM Cartel: By Spammer-X by Spammer-X., Jeffrey Posluns (Editor), and Stu Sjouwerman (Foreword) (Paperback - Nov 27, 2004) Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft by Eric Cole, and Sandra Ring (Paperback - Mar 15, 2006) Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash (Paperback - Apr 26, 2005) Intrusion Prevention Fundamentals by Earl Carter, and Jonathan Hogue (Paperback - Jan 28, 2006) iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets by Jonathan A. Zdziarski (Paperback - Sep 12, 2008) IPv6 Security by Scott Hogg, and Eric Vyncke (Paperback - Dec 21, 2008) Joomla! Web Security by Tom Canavan (Paperback - Oct 15, 2008)
  • 5. Kismet Hacking by Brad Haines, Frank Thornton, and Michael Schearer (Paperback - Jun 25, 2008) Know Your Enemy: Learning about Security Threats (2nd Edition) by Honeynet Project The (Paperback - May 27, 2004) LAN Switch Security: What Hackers Know About Your Switches by Eric Vyncke, and Christopher Paggen (Paperback - Sep 16, 2007) Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts by Ali Jahangiri (Paperback - Oct 21, 2009) Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit by Ryan R. Kubasiak, Sean Morrissey, and Jesse Varsalone (Paperback - Dec 8, 2008) Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin, Eoghan Casey, and James M. Aquilina (Paperback - Jun 30, 2008) Malware: Fighting Malicious Code by Ed Skoudis, and Lenny Zeltser (Paperback - Nov 17, 2003) Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula (Paperback - Oct 29, 2010) Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals by Constantine Photopoulos (Paperback - Apr 18, 2008) Managing Information Security by John R. Vacca (Paperback - Mar 29, 2010) Managing Security with Snort and IDS Tools by Christopher Gerg, and Kerry J. Cox (Paperback - Aug 2004) Mastering Windows Network Forensics and Investigation by Steven Anson, and Steve Bunting (Paperback - Apr 2, 2007) Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research by David Maynor (Paperback - Oct 2, 2007) Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices by Max Schubert (Paperback - Jun 2, 2008) Nessus Network Auditing, Second Edition by Mark Carey (Paperback - May 27, 2008) Netcat Power Tools by Jan Kanclirz, and Brian Baskin (Paperback - Jun 27, 2008) Network and System Security by John R. Vacca (Paperback - Mar 29, 2010) Network Security Architectures by Sean Convery (Hardcover - Apr 29, 2004) Network Security Assessment: From Vulnerability to Patch by Steve Manzuik, Andre Gold, and Chris Gatford (Paperback - Nov 7, 2006) Network Security Assessment: Know Your Network by Chris McNab (Paperback - Nov 1, 2007) Network Security Auditing (Networking Technology: Security) by Chris Jackson (Paperback - Jun 12, 2010) Network Warrior: Everything you need to know that wasn't on the CCNA exam by Gary A. Donahue (Paperback - Jun 1, 2007) Next Generation SSH2 Implementation: Securing Data in Motion by Max Caceres, Aaron E. Earle, Devin Ganger, and Wipul Jayawickrama (Paperback - Nov 28, 2008) Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, and Jason Andress (Paperback - Oct 8, 2010) Nmap in the Enterprise: Your Guide to Network Scanning by Angela Orebaugh, and Becky Pinkard (Paperback - Mar 14, 2008) No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long (Paperback - Feb. 21, 2008)
  • 6. Official Certified Ethical Hacker Review Guide by Steven DeFino and Barry Kaufman (Paperback - Nov. 9, 2009) Open Source Fuzzing Tools by Noam Rathaus, and Gadi Evron (Paperback - Dec 28, 2007) OS X Exploits and Defense: Own it...Just Like Windows or Linux! by Paul Baccas, Kevin Finisterre, Larry H., and David Harley (Paperback - Apr 25, 2008) OS X for Hackers at Heart by Bruce Potter, Chris Hurley, Johnny Long, and Tom Owad (Paperback - Nov. 19, 2005) - Illustrated OSSEC Host-Based Intrusion Detection Guide by Andrew Hay, Daniel Cid, and Rory Bray (Paperback - Mar 17, 2008) PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Dr. Anton Chuvakin, and Branden R. Williams (Paperback - Dec 15, 2009) Penetration Tester's Open Source Toolkit, Vol. 2 - Paperback (Nov. 30, 2007) by Jeremy Faircloth and Chris Hurley Penetration Testing and Network Defense by Andrew Whitaker, and Daniel Newman (Paperback - Nov 10, 2005) Penetration Testing: Communication Media Testing (Ec-Council Press Series: Certified Security Analyst) by EC-Council (Paperback - Jun 23, 2010) Penetration Testing: Network & Perimeter Testing (Ec-Council/ Certified Security Analyst) by EC-Council (Paperback - May 4, 2010) Penetration Testing: Network Threat Testing (Ec-Council Press Series: Certified Security Analyst) by EC-Council (Paperback - Jun 23, 2010) Penetration Testing: Procedures & Methodologies (Ec-Council/ Certified Security Analyst) by EC-Council (Paperback - May 4, 2010) Penetration Testing: Security Analysis (Penetration Testing: Ec-Council/ Press Series: Certified Security Analyst) by EC-Council (Paperback - Apr 5, 2010) Perfect Password: Selection, Protection, Authentication by Mark Burnett, and Dave Kleiman (Paperback - Dec 25, 2005) Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring by Harlan Carvey (Paperback - Dec 26, 2007) Phishing Exposed by Lance James (Paperback - Jan 20, 2006) Practical Cryptography by Niels Ferguson, and Bruce Schneier (Paperback - Mar 28, 2003) Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century - Paperback (July 4, 2009) by Ryan Trost Practical Oracle Security: Your Unauthorized Guide to Relational Database Security by Josh Shaul, and Aaron Ingram (Paperback - Nov 26, 2007) Practical VoIP Security by Thomas Porter, Jan Kanclirz Jr., and Brian Baskin (Paperback - Jun 10, 2006) Professional Pen Testing for Web Applications (Programmer to Programmer) by Andres Andreu (Paperback - Jul 5, 2006) Professional Penetration Testing: Creating and Operating a Formal Hacking Lab by Thomas Wilhelm (Paperback - Aug 28, 2009) Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking by Raoul Chiesa, Stefania Ducci, and Silvio Ciappi (Paperback - Dec 11, 2008) Real Digital Forensics: Computer Security and Incident Response by Keith J. Jones, Richard Bejtlich, and Curtis W. Rose (Paperback - Oct 3, 2005) Reversing: Secrets of Reverse Engineering by Eldad Eilam (Paperback - Apr 15, 2005)
  • 7. Rootkits for Dummies (For Dummies (Computer/Tech)) by Larry Stevenson, and Nancy Altholz (Paperback - Jan 30, 2007) Rootkits: Subverting the Windows Kernel by Greg Hoglund, and Jamie Butler (Paperback - Aug 1, 2005) Router Security Strategies: Securing IP Network Traffic Planes by Gregg Schudel, and David J. Smith (Paperback - Jan 8, 2008) Sarbanes-Oxley IT Compliance Using Open Source Tools, Second Edition by Christian B Lahti, and Roderick Peterson (Paperback - Dec 28, 2007) Sarbanes-Oxley For Dummies by Jill Gilbert Welytok (Paperback - Feb 26, 2008) Schneier on Security by Bruce Schneier (Hardcover - Sep 29, 2008) Secrets and Lies: Digital Security in a Networked World by Bruce Schneier (Paperback- Jan 30, 2004) Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century by Christopher Burgess (Paperback - Mar 19, 2008) Secure Your Network for Free by Eric Seagren (Paperback - Feb 15, 2007) Securing IM and P2P Applications for the Enterprise by Marcus Sachs, Paul Piccard, Brian Baskin, and George Spillman (Paperback - May 1, 2005) Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures by Peter Thermos, and Ari Takanen (Paperback - Aug 11, 2007) Security Data Visualization: Graphical Techniques for Network Analysis by Greg Conti (Paperback - Oct 1, 2007) Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson (Hardcover - Apr 14, 2008) Security Log Management: Identifying Patterns in the Chaos by Jacob Babbin, Dave Kleiman, Everett F. Carter Jr., and Jeremy Faircloth (Paperback - Apr 13, 2006) Security Metrics: Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith (Paperback - Apr 5, 2007) Security Monitoring with Cisco Security MARS by Gary Halleen, and Greg Kellogg (Paperback - Jul 16, 2007) Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks by Chris Fry, and Martin Nystrom (Paperback - Feb 16, 2009) Security Threat Mitigation and Response: Understanding Cisco Security MARS by Dale Tesch, and Greg Abelar (Paperback - Oct 8, 2006) Security Warrior by Cyrus Peikari, and Anton Chuvakin (Paperback - Feb 1, 2004) Self-Defending Networks: The Next Generation of Network Security by Duane De Capite (Paperback - Sep 10, 2006) Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal Zalewski (Paperback - Apr 15, 2005) Snort IDS and IPS Toolkit (Jay Beale's Open Source Security) by Brian Caswell, Jay Beale, and Andrew Baker (Paperback - Feb 1, 2007) Social Engineering: The Art of Human Hacking by Christopher Hadnagy (Paperback - Dec 8, 2010) Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James C Foster (Paperback - Apr 26, 2005)
  • 8. Software Piracy Exposed by Paul Craig, and Mark Burnett (Paperback - May 1, 2005) Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day by Ira Winkler (Hardcover - Apr 8, 2005) SQL Hacks by Andrew Cumming, and Gordon Russell (Paperback - Nov 21, 2006) SQL Injection Attacks and Defense by Justin Clarke (Paperback - May 15, 2009) SQL Server Forensic Analysis by Kevvie Fowler (Paperback - Dec 26, 2008) Steal This Computer Book 4.0: What They Won't Tell You about the Internet by Wallace Wang (Paperback - Apr. 15, 2006) Stealing the Network: How to Own a Continent by FX, Paul Craig, Joe Grand, and Tim Mullen (Paperback - May 2004) Stealing the Network: How to Own a Shadow by Johnny Long, Timothy Mullen, and Ryan Russell (Paperback - Feb 15, 2007) Stealing the Network: How to Own an Identity by Ryan Russell, Riley Eller, Jay Beale, and Chris Hurley (Paperback - May 1, 2005) Stealing the Network: How to Own the Box by Ryan Russell, Ido Dubrawsky, FX, and Joe Grand (Paperback - May 29, 2003) Surviving Cyberwar by Richard Stiennon (Paperback - Jul 16, 2010) Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook by Jack Wiles (Paperback - Oct 23, 2007) Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators by Jack Wiles, Johnny Long (Paperback - Mar 26, 2007) Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure by Jack Wiles (Paperback - Jul 30, 2008) The Art of Computer Virus Research and Defense by Peter Szor (Paperback - Feb 13, 2005) The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, and Steve Wozniak (Paperback - Oct 17, 2003) The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, and William L. Simon (Paperback - Dec 27, 2005) The Art of Software Security Testing: Identifying Software Security Flaws by Chris Wysopal, Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin (Paperback - Nov 27, 2006) The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein (Hardcover - July 28, 2008) The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L. Krutz, and Russell Dean Vines (Hardcover - Oct 22, 2007) The Dark Visitor (paperback) (Unknown Binding - Jan 1, 2007) The Database Hacker's Handbook: Defending Database Servers by David Litchfield, Chris Anley, John Heasman, and Bill Grindlay (Paperback - Jul 14, 2005) The dotCrime Manifesto: How to Stop Internet Crime by Phillip Hallam-Baker (Hardcover - Jan 8, 2008) The Ethical Hack: A Framework for Business Value Penetration Testing by James S. Tiller (Hardcover - Sep 29, 2004) The Insider: A True Story by Dan Verton (Hardcover - Jun 24, 2005) The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments by Craig Wright (Paperback - Jul 4, 2008) The Mezonic Agenda: Hacking the Presidency by Herbert Thomson (Paperback - Oct 7, 2004) The Myths of Security: What the Computer Security Industry Doesn't Want You to Know by John Viega (Paperback - Jun 19, 2009)
  • 9. The New School of Information Security by Adam Shostack, and Andrew Stewart (Hardcover - Apr 5, 2008) The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator by Dave Kleiman (Paperback - Oct 8, 2007) The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System by Bill Blunden (Paperback - May 4, 2009) The Tao of Network Security Monitoring: Beyond Intrusion Detection - Paperback (July 22, 2004) by Richard Bejtlich The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto (Paperback - Oct. 22, 2007) Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp and Kevin Mitnick (Paperback - Sept. 22, 2009) UNIX and Linux Forensic Analysis DVD Toolkit by Chris Pogue, Cory Altheide, and Todd Haverkos (Paperback - Jun 30, 2008) Virtual Honeypots: From Botnet Tracking to Intrusion Detection by Niels Provos, and Thorsten Holz (Paperback - Jul 26, 2007) Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments by Diane Barrett, and Greg Kipper (Paperback - Jun 1, 2010) Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting by John Hoopes (Paperback - Dec 26, 2008) Voice over IP Security by Patrick Park (Paperback - Sep 19, 2008) WarDriving and Wireless Penetration Testing by Chris Hurley, Russ Rogers, Frank Thornton, and Brian Baker (Paperback - Jan 15, 2007) Web Application Vulnerabilities: Detect, Exploit, Prevent by Steven Palmer (Paperback - Dec. 28, 2007) Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast by Paco Hope, and Ben Walther (Paperback - Oct 17, 2008) Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition) by Andrew Vladimirov, Konstantin V. Gavrilenko, and Andrei A. Mikhailovsky (Paperback - Jul 28, 2008) Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan A. Carvey (Paperback - Jun 11, 2009) Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security) by Angela Orebaugh, Gilbert Ramirez, and Jay Beale (Paperback - Feb 14, 2007) Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide by Laura Chappell, and Gerald Combs (Paperback - Mar 15, 2010) Writing Security Tools and Exploits - Paperback - Illustrated (Mar. 11, 2006) by James C. Foster XSS Attacks: Cross Site Scripting Exploits and Defense by Seth Fogie, Jeremiah Grossman, Robert Hansen, and Anton Rager (Paperback - May 15, 2007) Zen and the Art of Information Security by Ira Winkler (Paperback - Mar 1, 2007) Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction) by Rob Shein, David Litchfield, and Marcus Sachs (Paperback - Aug 4, 2004) Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity by Byron Acohido, and Jon Swartz (Hardcover - Apr 1, 2008)