Infosec books


Published on

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Infosec books

  1. 1. Advanced Surveillance: The Complete Manual of Surveillance Training by Peter Jenkins (Paperback - Oct 2003) Aggressive Network Self-Defense by Neil R. Wyler, Bruce Potter, and Chris Hurley (Paperback - Feb. 26, 2005) - Illustrated Alternate Data Storage Forensics by Amber Schroader, and Tyler Cohen (Paperback - Oct 1, 2007) Applied Security Visualization by Raffael Marty (Paperback - Aug 11, 2008) Asterisk Hacking by Ben Jackson, Champ Clark, Johnny Long, and Larry Chaffin (Paperback - Jun 29, 2007) AVIEN Malware Defense Guide for the Enterprise by David Harley, Ken Bechtel, Michael Blanchard, and Henk K. Diemer (Paperback - Aug. 5, 2007) Beautiful Security: Leading Security Experts Explain How They Think by Andy Oram, and John Viega (Paperback - Apr 28, 2009) Beyond Fear: Thinking Sensibly About Security in an Uncertain World. by Bruce Schneier (Hardcover - May 4, 2003) Black Hat Physical Device Security: Exploiting Hardware and Software by Drew Miller (Hardcover - Oct 29, 2004) Botnets: The Killer Web App by Craig Schiller, Jim Binkley, Gadi Evron, and Carsten Willems (Paperback - Feb 15, 2007) Build Your Own Security Lab: A Field Guide for Network Testing by Michael Gregg (Paperback - Apr 28, 2008) Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility by Andrew Jones, and Craig Valli (Paperback - Oct 7, 2008) CD and DVD Forensics by Paul Crowley, and Dave Kleiman (Paperback - Mar 12, 2007) CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 by Kimberly Graves (Paperback - Feb. 27, 2007) Chained Exploits: Advanced Hacking Attacks from Start to Finish by Andrew Whitaker, Keatron Evans, and Jack B. Voth (Paperback - Mar 9, 2009) China's Techno-Warriors: National Security and Strategic Competition from the Nuclear to the Information Age by Evan A. Feigenbaum (Hardcover - Mar 18, 2003) Cisco Network Security Troubleshooting Handbook by Mynul Hoda (Paperback - Nov 21, 2005) Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity by Dale Liu (Paperback - Apr 28, 2009) Cisco Voice Over IP Security by Stephen Dugan (Paperback - Jul 2005) CISSP All-in-One Exam Guide, Fifth Edition by Shon Harris (Hardcover - Jan 15, 2010) CISSP For Dummies by Lawrence C. Miller, and Peter H. Gregory (Paperback - Dec 9, 2009) CISSP Practice Exams (All-in-One) by Shon Harris (Paperback - Jul 9, 2010) Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat by Paul Piccard (Paperback - Sep 19, 2006) Computer Forensics For Dummies by Linda Volonino, and Reynaldo Anzaldua (Paperback - Oct 13, 2008) Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics) by EC-Council (Paperback - Sep 17, 2009) Computer Forensics: Investigating Data and Image Files (Ec-Council Press Series: Computer Forensics) by EC-Council (Paperback - Sep 16, 2009)
  2. 2. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics) by EC-Council (Paperback - Sep 16, 2009) Computer Forensics: Investigating Wireless Networks and Devices (C(Computer) Hfi (Hacking Forensic Investigator) by EC-Council (Paperback - Sep 17, 2009) Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series) by EC-Council (Paperback - Sep 17, 2009) Computer Security and Penetration Testing by Alfred Basta, and Wolf Halton (Paperback - Aug 31, 2007) Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) by Edward Skoudis, and Tom Liston (Paperback - Jan 2, 2006) Crimeware: Understanding New Attacks and Defenses by Markus Jakobsson, and Zulfikar Ramzan (Paperback - Apr 16, 2008) Cyber Adversary Characterization: Auditing the Hacker Mind by Tom Parker, Marcus Sachs, Eric Shaw, and Ed Stroz (Paperback - Jun 2004) Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Anthony Reyes (Paperback - Feb 26, 2007) Cyber War: The Next Threat to National Security and What to Do About It by Richard A. Clarke, and Robert Knake (Hardcover - Apr 20, 2010) Cyberpower and National Security (National Defense University) by Franklin D. Kramer, Stuart H. Starr, and Larry Wentz (Paperback - Apr 30, 2009) Cyberdeterrence and Cyberwar by Martin C. Libicki (Paperback - Nov 25, 2009) Cyberthreats: The Emerging Fault Lines of the Nation State by Susan W. Brenner (Hardcover - Jan 16, 2009) Cyberwar, Netwar and the Revolution in Military Affairs (part 1) - Hardcover (Sept. 4, 2006) by Edward F. Halpin, Philippa Trevorrow, David Webb, and Steve Wright CyberWar, CyberTerror, CyberCrime by Julie E. Mehan (Paperback - Apr 17, 2008) Department of Defense Sponsored Information Security Research: New Methods for Protecting Against Cyber Threats by Department of Defense (Hardcover - Jul 17, 2007) Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data by Terrence V. Lillard (Paperback - Jun 16, 2010) Digital Triage Forensics: Processing the Digital Crime Scene by Stephen Pearson, and Richard Watson (Paperback - Jul 12, 2010) Dissecting the Hack: The F0rb1dd3n Network by Jayson E. Street, Kent Nabors, and Dustin L. Fritz (Hardcover - Oct. 1, 2009) Emerging Threat Analysis: From Mischief to Malicious by Michael Gregg, and Brian Baskin (Paperback - Jan 13, 2007) Encyclopedia of Cybercrime by Samuel C. McQuade III (Hardcover - Nov 30, 2008) End-to-End Network Security: Defense-in-Depth by Omar Santos (Paperback - Sep 3, 2007) Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures by Brian Contos (Paperback - Jan 7, 2007) Ethical Hacking and Countermeasures: Attack Phases (Ec-Council Press Series: Certified Ethical Hacker) by EC-Council (Paperback - Sep 22, 2009) Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (C/ E H: Certified Ethical Hacker) by EC-Council (Paperback - Sep 24, 2009) Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (Ec-Council Press Series: Certified Ethical Hacker) by EC-Council (Paperback - Sep 22, 2009)
  3. 3. Ethical Hacking and Countermeasures: Secure Network Infrastructures (C/ E H: Certified Ethical Hacker) by EC-Council (Paperback - Sep 24, 2009) Ethical Hacking and Countermeasures: Web Applications and Data Servers (Ec-Council Press Series) by EC-Council (Paperback - Sep 24, 2009) Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed) - Paperback (July 18, 2005) by Victor Oppleman, Oliver Friedrichs, and Brett Watson Extrusion Detection: Security Monitoring for Internal Intrusions - Paperback (Nov. 18, 2005) by Richard Bejtlich Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet by Joseph Menn (Hardcover - Jan 26, 2010) File System Forensic Analysis by Brian Carrier (Paperback - Mar 27, 2005) Forensic Discovery by Dan Farmer, and Wietse Venema (Paperback - Dec 28, 2009) Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, and Pedram Amini (Paperback - Jul 9, 2007) GFI Network Security and PCI Compliance Power Tools by Brien Posey (Paperback - Sep 22, 2008) Google Hacking for Penetration Testers by Johnny Long (Paperback - Nov. 2, 2007) Google Hacking for Penetration Testers, Volume 2 by Johnny Long (Kindle Edition - Nov. 2, 2007) - Kindle Book Googling Security: How Much Does Google Know About You? by Greg Conti (Paperback - Oct 20, 2008) Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness (Paperback - Dec 20, 2007) Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network by Michael Gregg (Paperback - Jan 10, 2007) Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson (Paperback - Jan 11, 2008) Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, and Brett Hardin (Paperback - Sept. 10, 2009) Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers, and Matthew G Devost (Paperback - Dec 1, 2004) Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions - Paperback (Dec. 15, 2005) by Andrew Vladimirov Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Aaron Philipp, David Cowen, and Chris Davis (Paperback - Sep 10, 2009) Hacking Exposed Linux, 3rd Edition by ISECOM (Paperback - July 15, 2008) Hacking Exposed Malware & Rootkits Secrets & Solutions by Michael Davis, Sean Bodmer, and Aaron LeMasters (Paperback - Sep 23, 2009) Hacking Exposed Network Security Secrets and Solutions, Sixth Edition by Stuart McClure, Joel Scambray, and George Kurtz (Paperback - Jan. 5, 2009) Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by David Endler and Mark Collier (Paperback - Nov. 28, 2006) Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, Zane Lackey, and Jesse Burns (Paperback - Dec 17, 2007) Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) by Joel Scambray, Mike Shema, and Caleb Sima (Paperback - Jun 5, 2006)
  4. 4. Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray (Paperback - Dec. 4, 2007) Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, and Vincent Liu (Paperback - Mar 26, 2007) Hacking For Dummies by Kevin Beaver (Paperback - Jan. 12, 2010) Hacking the Human by Ian Mann (Hardcover - Nov 1, 2008) Hacking VoIP: Protocols, Attacks, and Countermeasures by Himanshu Dwivedi (Paperback - Mar 21, 2008) Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) by Kevin Beaver, Peter T. Davis, and Devin K. Akin (Paperback - Sept. 13, 2005) Hacktivism and Cyberwars: Rebels with a Cause? - Hardcover (Aug. 6, 2004) by Tim Jordan and Paul Taylor Hardening Linux by James Turnbull (Paperback - Feb 1, 2005) Hardening Network Infrastructure by Wesley J. Noonan (Paperback - May 7, 2004) Hardening Windows, Second Edition by Jonathan Hassell (Paperback - Jun 2, 2010) Honeypots for Windows (The Experts Voice) by Roger A. Grimes (Paperback - Feb 14, 2005) Honeypots: Tracking Hackers by Lance Spitzner (Paperback - Sep 20, 2002) Host Integrity Monitoring Using Osiris and Samhain by Brian Wotring (Paperback - May 1, 2005) How to Cheat at Configuring Open Source Security Tools by Michael Gregg, Eric Seagren, Angela Orebaugh, and Matt Jonkman (Paperback - May 28, 2007) How to Cheat at Securing a Wireless Network by Chris Hurley, and Jan Kanclirz Jr. (Paperback - Oct 5, 2006) How to Cheat at Securing Linux by James Stanger (Paperback - Nov 13, 2007) How to Cheat at Securing Your Network (How to Cheat) by Ido Dubrawsky (Paperback - Oct 16, 2007) InfoSec Career Hacking: Sell Your Skillz, Not Your Soul by Aaron W. Bayles, Chris Hurley, Johnny Long, and Ed Brindley (Paperback - Apr 1, 2005) InfoSecurity 2008 Threat Analysis by Craig Schiller, Seth Fogie, Colby DeRodeff, and Michael Gregg (Paperback - Nov 12, 2007) Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr (Paperback - Dec 15, 2009) Inside Network Perimeter Security (2nd Edition) by Stephen Northcutt, Lenny Zeltser, Scott Winters, and Karen Kent (Paperback - Mar 14, 2005) Inside the SPAM Cartel: By Spammer-X by Spammer-X., Jeffrey Posluns (Editor), and Stu Sjouwerman (Foreword) (Paperback - Nov 27, 2004) Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft by Eric Cole, and Sandra Ring (Paperback - Mar 15, 2006) Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash (Paperback - Apr 26, 2005) Intrusion Prevention Fundamentals by Earl Carter, and Jonathan Hogue (Paperback - Jan 28, 2006) iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets by Jonathan A. Zdziarski (Paperback - Sep 12, 2008) IPv6 Security by Scott Hogg, and Eric Vyncke (Paperback - Dec 21, 2008) Joomla! Web Security by Tom Canavan (Paperback - Oct 15, 2008)
  5. 5. Kismet Hacking by Brad Haines, Frank Thornton, and Michael Schearer (Paperback - Jun 25, 2008) Know Your Enemy: Learning about Security Threats (2nd Edition) by Honeynet Project The (Paperback - May 27, 2004) LAN Switch Security: What Hackers Know About Your Switches by Eric Vyncke, and Christopher Paggen (Paperback - Sep 16, 2007) Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts by Ali Jahangiri (Paperback - Oct 21, 2009) Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit by Ryan R. Kubasiak, Sean Morrissey, and Jesse Varsalone (Paperback - Dec 8, 2008) Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin, Eoghan Casey, and James M. Aquilina (Paperback - Jun 30, 2008) Malware: Fighting Malicious Code by Ed Skoudis, and Lenny Zeltser (Paperback - Nov 17, 2003) Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula (Paperback - Oct 29, 2010) Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals by Constantine Photopoulos (Paperback - Apr 18, 2008) Managing Information Security by John R. Vacca (Paperback - Mar 29, 2010) Managing Security with Snort and IDS Tools by Christopher Gerg, and Kerry J. Cox (Paperback - Aug 2004) Mastering Windows Network Forensics and Investigation by Steven Anson, and Steve Bunting (Paperback - Apr 2, 2007) Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research by David Maynor (Paperback - Oct 2, 2007) Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices by Max Schubert (Paperback - Jun 2, 2008) Nessus Network Auditing, Second Edition by Mark Carey (Paperback - May 27, 2008) Netcat Power Tools by Jan Kanclirz, and Brian Baskin (Paperback - Jun 27, 2008) Network and System Security by John R. Vacca (Paperback - Mar 29, 2010) Network Security Architectures by Sean Convery (Hardcover - Apr 29, 2004) Network Security Assessment: From Vulnerability to Patch by Steve Manzuik, Andre Gold, and Chris Gatford (Paperback - Nov 7, 2006) Network Security Assessment: Know Your Network by Chris McNab (Paperback - Nov 1, 2007) Network Security Auditing (Networking Technology: Security) by Chris Jackson (Paperback - Jun 12, 2010) Network Warrior: Everything you need to know that wasn't on the CCNA exam by Gary A. Donahue (Paperback - Jun 1, 2007) Next Generation SSH2 Implementation: Securing Data in Motion by Max Caceres, Aaron E. Earle, Devin Ganger, and Wipul Jayawickrama (Paperback - Nov 28, 2008) Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, and Jason Andress (Paperback - Oct 8, 2010) Nmap in the Enterprise: Your Guide to Network Scanning by Angela Orebaugh, and Becky Pinkard (Paperback - Mar 14, 2008) No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long (Paperback - Feb. 21, 2008)
  6. 6. Official Certified Ethical Hacker Review Guide by Steven DeFino and Barry Kaufman (Paperback - Nov. 9, 2009) Open Source Fuzzing Tools by Noam Rathaus, and Gadi Evron (Paperback - Dec 28, 2007) OS X Exploits and Defense: Own it...Just Like Windows or Linux! by Paul Baccas, Kevin Finisterre, Larry H., and David Harley (Paperback - Apr 25, 2008) OS X for Hackers at Heart by Bruce Potter, Chris Hurley, Johnny Long, and Tom Owad (Paperback - Nov. 19, 2005) - Illustrated OSSEC Host-Based Intrusion Detection Guide by Andrew Hay, Daniel Cid, and Rory Bray (Paperback - Mar 17, 2008) PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Dr. Anton Chuvakin, and Branden R. Williams (Paperback - Dec 15, 2009) Penetration Tester's Open Source Toolkit, Vol. 2 - Paperback (Nov. 30, 2007) by Jeremy Faircloth and Chris Hurley Penetration Testing and Network Defense by Andrew Whitaker, and Daniel Newman (Paperback - Nov 10, 2005) Penetration Testing: Communication Media Testing (Ec-Council Press Series: Certified Security Analyst) by EC-Council (Paperback - Jun 23, 2010) Penetration Testing: Network & Perimeter Testing (Ec-Council/ Certified Security Analyst) by EC-Council (Paperback - May 4, 2010) Penetration Testing: Network Threat Testing (Ec-Council Press Series: Certified Security Analyst) by EC-Council (Paperback - Jun 23, 2010) Penetration Testing: Procedures & Methodologies (Ec-Council/ Certified Security Analyst) by EC-Council (Paperback - May 4, 2010) Penetration Testing: Security Analysis (Penetration Testing: Ec-Council/ Press Series: Certified Security Analyst) by EC-Council (Paperback - Apr 5, 2010) Perfect Password: Selection, Protection, Authentication by Mark Burnett, and Dave Kleiman (Paperback - Dec 25, 2005) Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring by Harlan Carvey (Paperback - Dec 26, 2007) Phishing Exposed by Lance James (Paperback - Jan 20, 2006) Practical Cryptography by Niels Ferguson, and Bruce Schneier (Paperback - Mar 28, 2003) Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century - Paperback (July 4, 2009) by Ryan Trost Practical Oracle Security: Your Unauthorized Guide to Relational Database Security by Josh Shaul, and Aaron Ingram (Paperback - Nov 26, 2007) Practical VoIP Security by Thomas Porter, Jan Kanclirz Jr., and Brian Baskin (Paperback - Jun 10, 2006) Professional Pen Testing for Web Applications (Programmer to Programmer) by Andres Andreu (Paperback - Jul 5, 2006) Professional Penetration Testing: Creating and Operating a Formal Hacking Lab by Thomas Wilhelm (Paperback - Aug 28, 2009) Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking by Raoul Chiesa, Stefania Ducci, and Silvio Ciappi (Paperback - Dec 11, 2008) Real Digital Forensics: Computer Security and Incident Response by Keith J. Jones, Richard Bejtlich, and Curtis W. Rose (Paperback - Oct 3, 2005) Reversing: Secrets of Reverse Engineering by Eldad Eilam (Paperback - Apr 15, 2005)
  7. 7. Rootkits for Dummies (For Dummies (Computer/Tech)) by Larry Stevenson, and Nancy Altholz (Paperback - Jan 30, 2007) Rootkits: Subverting the Windows Kernel by Greg Hoglund, and Jamie Butler (Paperback - Aug 1, 2005) Router Security Strategies: Securing IP Network Traffic Planes by Gregg Schudel, and David J. Smith (Paperback - Jan 8, 2008) Sarbanes-Oxley IT Compliance Using Open Source Tools, Second Edition by Christian B Lahti, and Roderick Peterson (Paperback - Dec 28, 2007) Sarbanes-Oxley For Dummies by Jill Gilbert Welytok (Paperback - Feb 26, 2008) Schneier on Security by Bruce Schneier (Hardcover - Sep 29, 2008) Secrets and Lies: Digital Security in a Networked World by Bruce Schneier (Paperback- Jan 30, 2004) Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century by Christopher Burgess (Paperback - Mar 19, 2008) Secure Your Network for Free by Eric Seagren (Paperback - Feb 15, 2007) Securing IM and P2P Applications for the Enterprise by Marcus Sachs, Paul Piccard, Brian Baskin, and George Spillman (Paperback - May 1, 2005) Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures by Peter Thermos, and Ari Takanen (Paperback - Aug 11, 2007) Security Data Visualization: Graphical Techniques for Network Analysis by Greg Conti (Paperback - Oct 1, 2007) Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson (Hardcover - Apr 14, 2008) Security Log Management: Identifying Patterns in the Chaos by Jacob Babbin, Dave Kleiman, Everett F. Carter Jr., and Jeremy Faircloth (Paperback - Apr 13, 2006) Security Metrics: Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith (Paperback - Apr 5, 2007) Security Monitoring with Cisco Security MARS by Gary Halleen, and Greg Kellogg (Paperback - Jul 16, 2007) Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks by Chris Fry, and Martin Nystrom (Paperback - Feb 16, 2009) Security Threat Mitigation and Response: Understanding Cisco Security MARS by Dale Tesch, and Greg Abelar (Paperback - Oct 8, 2006) Security Warrior by Cyrus Peikari, and Anton Chuvakin (Paperback - Feb 1, 2004) Self-Defending Networks: The Next Generation of Network Security by Duane De Capite (Paperback - Sep 10, 2006) Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal Zalewski (Paperback - Apr 15, 2005) Snort IDS and IPS Toolkit (Jay Beale's Open Source Security) by Brian Caswell, Jay Beale, and Andrew Baker (Paperback - Feb 1, 2007) Social Engineering: The Art of Human Hacking by Christopher Hadnagy (Paperback - Dec 8, 2010) Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James C Foster (Paperback - Apr 26, 2005)
  8. 8. Software Piracy Exposed by Paul Craig, and Mark Burnett (Paperback - May 1, 2005) Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day by Ira Winkler (Hardcover - Apr 8, 2005) SQL Hacks by Andrew Cumming, and Gordon Russell (Paperback - Nov 21, 2006) SQL Injection Attacks and Defense by Justin Clarke (Paperback - May 15, 2009) SQL Server Forensic Analysis by Kevvie Fowler (Paperback - Dec 26, 2008) Steal This Computer Book 4.0: What They Won't Tell You about the Internet by Wallace Wang (Paperback - Apr. 15, 2006) Stealing the Network: How to Own a Continent by FX, Paul Craig, Joe Grand, and Tim Mullen (Paperback - May 2004) Stealing the Network: How to Own a Shadow by Johnny Long, Timothy Mullen, and Ryan Russell (Paperback - Feb 15, 2007) Stealing the Network: How to Own an Identity by Ryan Russell, Riley Eller, Jay Beale, and Chris Hurley (Paperback - May 1, 2005) Stealing the Network: How to Own the Box by Ryan Russell, Ido Dubrawsky, FX, and Joe Grand (Paperback - May 29, 2003) Surviving Cyberwar by Richard Stiennon (Paperback - Jul 16, 2010) Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook by Jack Wiles (Paperback - Oct 23, 2007) Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators by Jack Wiles, Johnny Long (Paperback - Mar 26, 2007) Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure by Jack Wiles (Paperback - Jul 30, 2008) The Art of Computer Virus Research and Defense by Peter Szor (Paperback - Feb 13, 2005) The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, and Steve Wozniak (Paperback - Oct 17, 2003) The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, and William L. Simon (Paperback - Dec 27, 2005) The Art of Software Security Testing: Identifying Software Security Flaws by Chris Wysopal, Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin (Paperback - Nov 27, 2006) The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein (Hardcover - July 28, 2008) The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L. Krutz, and Russell Dean Vines (Hardcover - Oct 22, 2007) The Dark Visitor (paperback) (Unknown Binding - Jan 1, 2007) The Database Hacker's Handbook: Defending Database Servers by David Litchfield, Chris Anley, John Heasman, and Bill Grindlay (Paperback - Jul 14, 2005) The dotCrime Manifesto: How to Stop Internet Crime by Phillip Hallam-Baker (Hardcover - Jan 8, 2008) The Ethical Hack: A Framework for Business Value Penetration Testing by James S. Tiller (Hardcover - Sep 29, 2004) The Insider: A True Story by Dan Verton (Hardcover - Jun 24, 2005) The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments by Craig Wright (Paperback - Jul 4, 2008) The Mezonic Agenda: Hacking the Presidency by Herbert Thomson (Paperback - Oct 7, 2004) The Myths of Security: What the Computer Security Industry Doesn't Want You to Know by John Viega (Paperback - Jun 19, 2009)
  9. 9. The New School of Information Security by Adam Shostack, and Andrew Stewart (Hardcover - Apr 5, 2008) The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator by Dave Kleiman (Paperback - Oct 8, 2007) The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System by Bill Blunden (Paperback - May 4, 2009) The Tao of Network Security Monitoring: Beyond Intrusion Detection - Paperback (July 22, 2004) by Richard Bejtlich The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto (Paperback - Oct. 22, 2007) Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp and Kevin Mitnick (Paperback - Sept. 22, 2009) UNIX and Linux Forensic Analysis DVD Toolkit by Chris Pogue, Cory Altheide, and Todd Haverkos (Paperback - Jun 30, 2008) Virtual Honeypots: From Botnet Tracking to Intrusion Detection by Niels Provos, and Thorsten Holz (Paperback - Jul 26, 2007) Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments by Diane Barrett, and Greg Kipper (Paperback - Jun 1, 2010) Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting by John Hoopes (Paperback - Dec 26, 2008) Voice over IP Security by Patrick Park (Paperback - Sep 19, 2008) WarDriving and Wireless Penetration Testing by Chris Hurley, Russ Rogers, Frank Thornton, and Brian Baker (Paperback - Jan 15, 2007) Web Application Vulnerabilities: Detect, Exploit, Prevent by Steven Palmer (Paperback - Dec. 28, 2007) Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast by Paco Hope, and Ben Walther (Paperback - Oct 17, 2008) Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition) by Andrew Vladimirov, Konstantin V. Gavrilenko, and Andrei A. Mikhailovsky (Paperback - Jul 28, 2008) Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan A. Carvey (Paperback - Jun 11, 2009) Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security) by Angela Orebaugh, Gilbert Ramirez, and Jay Beale (Paperback - Feb 14, 2007) Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide by Laura Chappell, and Gerald Combs (Paperback - Mar 15, 2010) Writing Security Tools and Exploits - Paperback - Illustrated (Mar. 11, 2006) by James C. Foster XSS Attacks: Cross Site Scripting Exploits and Defense by Seth Fogie, Jeremiah Grossman, Robert Hansen, and Anton Rager (Paperback - May 15, 2007) Zen and the Art of Information Security by Ira Winkler (Paperback - Mar 1, 2007) Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction) by Rob Shein, David Litchfield, and Marcus Sachs (Paperback - Aug 4, 2004) Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity by Byron Acohido, and Jon Swartz (Hardcover - Apr 1, 2008)