Wednesday, August 10, 2011

Hacking Books 

List of Information Security, Hacking , Exploitation, Monitoring, Rootkit :-

Monitoring :-

  1. Advanced Surveillance: The Complete Manual of Surveillance Training by Peter Jenkins (Paperback - Oct 2003)
  2. Aggressive Network Self-Defense by Neil R. Wyler, Bruce Potter, and Chris Hurley (Paperback - Feb. 26, 2005)
  3. - Illustrated Alternate Data Storage Forensics by Amber Schroader, and Tyler Cohen (Paperback - Oct 1, 2007)
  4. Applied Security Visualization by Raffael Marty (Paperback - Aug 11, 2008)
  5. Asterisk Hacking by Ben Jackson, Champ Clark, Johnny Long, and Larry Chaffin (Paperback - Jun 29, 2007)
  6. AVIEN Malware Defense Guide for the Enterprise by David Harley, Ken Bechtel, Michael Blanchard, and Henk K. Diemer (Paperback - Aug. 5, 2007)
  7. Beautiful Security: Leading Security Experts Explain How They Think by Andy Oram, and John Viega (Paperback - Apr 28, 2009)
  8. Beyond Fear: Thinking Sensibly About Security in an Uncertain World. by Bruce Schneier (Hardcover - May 4, 2003)
  9. Black Hat Physical Device Security: Exploiting Hardware and Software by Drew Miller (Hardcover - Oct 29, 2004)
  10. Botnets: The Killer Web App by Craig Schiller, Jim Binkley, Gadi Evron, and Carsten Willems (Paperback - Feb 15, 2007)
  11. Build Your Own Security Lab: A Field Guide for Network Testing by Michael Gregg (Paperback - Apr 28, 2008)
  12. Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility by Andrew Jones, and Craig Valli (Paperback - Oct 7, 2008)
  13. CD and DVD Forensics by Paul Crowley, and Dave Kleiman (Paperback - Mar 12, 2007)
  14. CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 by Kimberly Graves (Paperback - Feb. 27, 2007)
  15. Chained Exploits: Advanced Hacking Attacks from Start to Finish by Andrew Whitaker, Keatron Evans, and Jack B. Voth (Paperback - Mar 9, 2009)
  16. China's Techno-Warriors: National Security and Strategic Competition from the Nuclear to the Information Age by Evan A. Feigenbaum (Hardcover - Mar 18, 2003)
  17. Cisco Network Security Troubleshooting Handbook by Mynul Hoda (Paperback - Nov 21, 2005)
  18. Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity by Dale Liu (Paperback - Apr 28, 2009)
  19. Cisco Voice Over IP Security by Stephen Dugan (Paperback - Jul 2005)
  20. CISSP All-in-One Exam Guide, Fifth Edition by Shon Harris (Hardcover - Jan 15, 2010)
  21. CISSP For Dummies by Lawrence C. Miller, and Peter H. Gregory (Paperback - Dec 9, 2009)
  22. CISSP Practice Exams (All-in-One)
  23. by Shon Harris (Paperback - Jul 9, 2010)
  24. Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat by Paul Piccard (Paperback - Sep 19, 2006)
  25. Computer Forensics For Dummies by Linda Volonino, and Reynaldo Anzaldua (Paperback - Oct 13, 2008)
  26. Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
  27. by EC-Council (Paperback - Sep 17, 2009)
  28. Computer Forensics: Investigating Data and Image Files (Ec-Council Press Series: Computer Forensics)
  29. by EC-Council (Paperback - Sep 16, 2009)
Computer forensics :-
  1. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics)
  2. by EC-Council (Paperback - Sep 16, 2009)
  3. Computer Forensics: Investigating Wireless Networks and Devices (C(Computer)
  4. Hfi (Hacking Forensic Investigator)
  5. by EC-Council (Paperback - Sep 17, 2009)
  6. Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
  7. by EC-Council (Paperback - Sep 17, 2009)
  8. Computer Security and Penetration Testing by Alfred Basta, and Wolf Halton (Paperback - Aug 31, 2007)
  9. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
  10. by Edward Skoudis, and Tom Liston (Paperback - Jan 2, 2006)
  11. Crimeware: Understanding New Attacks and Defenses by Markus Jakobsson, and Zulfikar Ramzan (Paperback - Apr 16, 2008)
  12. Cyber Adversary Characterization: Auditing the Hacker Mind by Tom Parker, Marcus Sachs, Eric Shaw, and Ed Stroz (Paperback - Jun 2004)
  13. Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Anthony Reyes (Paperback - Feb 26, 2007)
  14. Cyber War: The Next Threat to National Security and What to Do About It by Richard A. Clarke, and Robert Knake (Hardcover - Apr 20, 2010)
  15. Cyberpower and National Security (National Defense University)
  16. by Franklin D. Kramer, Stuart H. Starr, and Larry Wentz (Paperback - Apr 30, 2009)
  17. Cyberdeterrence and Cyberwar by Martin C. Libicki (Paperback - Nov 25, 2009)
  18. Cyberthreats: The Emerging Fault Lines of the Nation State by Susan W. Brenner (Hardcover - Jan 16, 2009)
  19. Cyberwar, Netwar and the Revolution in Military Affairs (part 1)
  20. - Hardcover (Sept. 4, 2006)
  21. by Edward F. Halpin, Philippa Trevorrow, David Webb, and Steve Wright CyberWar, CyberTerror, CyberCrime by Julie E. Mehan (Paperback - Apr 17, 2008)
  22. Department of Defense Sponsored Information Security Research: New Methods for Protecting Against Cyber Threats by Department of Defense (Hardcover - Jul 17, 2007)
  23. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data by Terrence V. Lillard (Paperback - Jun 16, 2010)
  24. Digital Triage Forensics: Processing the Digital Crime Scene by Stephen Pearson, and Richard Watson (Paperback - Jul 12, 2010)
  25. Dissecting the Hack: The F0rb1dd3n Network by Jayson E. Street, Kent Nabors, and Dustin L. Fritz (Hardcover - Oct. 1, 2009)
  26. Emerging Threat Analysis: From Mischief to Malicious by Michael Gregg, and Brian Baskin (Paperback - Jan 13, 2007)
  27. Encyclopedia of Cybercrime by Samuel C. McQuade III (Hardcover - Nov 30, 2008)
  28. End-to-End Network Security: Defense-in-Depth by Omar Santos (Paperback - Sep 3, 2007)
  29. Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures by Brian Contos (Paperback - Jan 7, 2007)
  30. Ethical Hacking and Countermeasures: Attack Phases (Ec-Council Press Series: Certified Ethical Hacker)
  31. by EC-Council (Paperback - Sep 22, 2009)
  32. Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (C/ E H: Certified Ethical Hacker)
  33. by EC-Council (Paperback - Sep 24, 2009)
  34. Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (Ec-Council Press Series: Certified Ethical Hacker)
  35. by EC-Council (Paperback - Sep 22, 2009)

Hacking / Social Engineering :-
  1. Ethical Hacking and Countermeasures: Secure Network Infrastructures (C/ E H: Certified Ethical Hacker)
  2. by EC-Council (Paperback - Sep 24, 2009)
  3. Ethical Hacking and Countermeasures: Web Applications and Data Servers (Ec-Council Press Series)
  4. by EC-Council (Paperback - Sep 24, 2009)
  5. Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
  6. - Paperback (July 18, 2005)
  7. by Victor Oppleman, Oliver Friedrichs, and Brett Watson Extrusion Detection: Security Monitoring for Internal Intrusions - Paperback (Nov. 18, 2005)
  8. by Richard Bejtlich Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet by Joseph Menn (Hardcover - Jan 26, 2010)
  9. File System Forensic Analysis by Brian Carrier (Paperback - Mar 27, 2005)
  10. Forensic Discovery by Dan Farmer, and Wietse Venema (Paperback - Dec 28, 2009)
  11. Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, and Pedram Amini (Paperback - Jul 9, 2007)
  12. GFI Network Security and PCI Compliance Power Tools by Brien Posey (Paperback - Sep 22, 2008)
  13. Google Hacking for Penetration Testers by Johnny Long (Paperback - Nov. 2, 2007)
  14. Google Hacking for Penetration Testers, Volume 2 by Johnny Long (Kindle Edition - Nov. 2, 2007)
  15. - Kindle Book Googling Security: How Much Does Google Know About You? by Greg Conti (Paperback - Oct 20, 2008)
  16. Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness (Paperback - Dec 20, 2007)
  17. Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network by Michael Gregg (Paperback - Jan 10, 2007)
  18. Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson (Paperback - Jan 11, 2008)
  19. Hacking: The Next Generation (Animal Guide)
  20. by Nitesh Dhanjani, Billy Rios, and Brett Hardin (Paperback - Sept. 10, 2009)
  21. Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers, and Matthew G Devost (Paperback - Dec 1, 2004)
  22. Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions - Paperback (Dec. 15, 2005)
  23. by Andrew Vladimirov Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Aaron Philipp, David Cowen, and Chris Davis (Paperback - Sep 10, 2009)
  24. Hacking Exposed Linux, 3rd Edition by ISECOM (Paperback - July 15, 2008)
  25. Hacking Exposed Malware & Rootkits Secrets & Solutions by Michael Davis, Sean Bodmer, and Aaron LeMasters (Paperback - Sep 23, 2009)
  26. Hacking Exposed Network Security Secrets and Solutions, Sixth Edition by Stuart McClure, Joel Scambray, and George Kurtz (Paperback - Jan. 5, 2009)
  27. Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by David Endler and Mark Collier (Paperback - Nov. 28, 2006)
  28. Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, Zane Lackey, and Jesse Burns (Paperback - Dec 17, 2007)
  29. Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed)
  30. by Joel Scambray, Mike Shema, and Caleb Sima (Paperback - Jun 5, 2006)

Exploits :-
  1. Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray (Paperback - Dec. 4, 2007)
  2. Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, and Vincent Liu (Paperback - Mar 26, 2007)
  3. Hacking For Dummies by Kevin Beaver (Paperback - Jan. 12, 2010)
  4. Hacking the Human by Ian Mann (Hardcover - Nov 1, 2008)
  5. Hacking VoIP: Protocols, Attacks, and Countermeasures by Himanshu Dwivedi (Paperback - Mar 21, 2008)
  6. Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)
  7. )
  8. by Kevin Beaver, Peter T. Davis, and Devin K. Akin (Paperback - Sept. 13, 2005)
  9. Hacktivism and Cyberwars: Rebels with a Cause? - Hardcover (Aug. 6, 2004)
  10. by Tim Jordan and Paul Taylor Hardening Linux by James Turnbull (Paperback - Feb 1, 2005)
  11. Hardening Network Infrastructure by Wesley J. Noonan (Paperback - May 7, 2004)
  12. Hardening Windows, Second Edition by Jonathan Hassell (Paperback - Jun 2, 2010)
  13. Honeypots for Windows (The Experts Voice)
  14. by Roger A. Grimes (Paperback - Feb 14, 2005)
  15. Honeypots: Tracking Hackers by Lance Spitzner (Paperback - Sep 20, 2002)
  16. Host Integrity Monitoring Using Osiris and Samhain by Brian Wotring (Paperback - May 1, 2005)
  17. How to Cheat at Configuring Open Source Security Tools by Michael Gregg, Eric Seagren, Angela Orebaugh, and Matt Jonkman (Paperback - May 28, 2007)
  18. How to Cheat at Securing a Wireless Network by Chris Hurley, and Jan Kanclirz Jr. (Paperback - Oct 5, 2006)
  19. How to Cheat at Securing Linux by James Stanger (Paperback - Nov 13, 2007)
  20. How to Cheat at Securing Your Network (How to Cheat)
  21. by Ido Dubrawsky (Paperback - Oct 16, 2007)
  22. InfoSec Career Hacking: Sell Your Skillz, Not Your Soul by Aaron W. Bayles, Chris Hurley, Johnny Long, and Ed Brindley (Paperback - Apr 1, 2005)
  23. InfoSecurity 2008 Threat Analysis by Craig Schiller, Seth Fogie, Colby DeRodeff, and Michael Gregg (Paperback - Nov 12, 2007)
  24. Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr (Paperback - Dec 15, 2009)
  25. Inside Network Perimeter Security (2nd Edition)
  26. by Stephen Northcutt, Lenny Zeltser, Scott Winters, and Karen Kent (Paperback - Mar 14, 2005)
  27. Inside the SPAM Cartel: By Spammer-X by Spammer-X., Jeffrey Posluns (Editor)
  28. , and Stu Sjouwerman (Foreword)
  29. (Paperback - Nov 27, 2004)
  30. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft by Eric Cole, and Sandra Ring (Paperback - Mar 15, 2006)
  31. Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash (Paperback - Apr 26, 2005)
  32. Intrusion Prevention Fundamentals by Earl Carter, and Jonathan Hogue (Paperback - Jan 28, 2006)
  33. iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets by Jonathan A. Zdziarski (Paperback - Sep 12, 2008)
  34. IPv6 Security by Scott Hogg, and Eric Vyncke (Paperback - Dec 21, 2008)
  35. Joomla! Web Security by Tom Canavan (Paperback - Oct 15, 2008)

Understanding hacking :-
  1. Kismet Hacking by Brad Haines, Frank Thornton, and Michael Schearer (Paperback - Jun 25, 2008)
  2. Know Your Enemy: Learning about Security Threats (2nd Edition)
  3. by Honeynet Project The (Paperback - May 27, 2004)
  4. LAN Switch Security: What Hackers Know About Your Switches by Eric Vyncke, and Christopher Paggen (Paperback - Sep 16, 2007)
  5. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts by Ali Jahangiri (Paperback - Oct 21, 2009)
  6. Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit by Ryan R. Kubasiak, Sean Morrissey, and Jesse Varsalone (Paperback - Dec 8, 2008)
  7. Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin, Eoghan Casey, and James M. Aquilina (Paperback - Jun 30, 2008)
  8. Malware: Fighting Malicious Code by Ed Skoudis, and Lenny Zeltser (Paperback - Nov 17, 2003)
  9. Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula (Paperback - Oct 29, 2010)
  10. Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals by Constantine Photopoulos (Paperback - Apr 18, 2008)
  11. Managing Information Security by John R. Vacca (Paperback - Mar 29, 2010)
  12. Managing Security with Snort and IDS Tools by Christopher Gerg, and Kerry J. Cox (Paperback - Aug 2004)
  13. Mastering Windows Network Forensics and Investigation by Steven Anson, and Steve Bunting (Paperback - Apr 2, 2007)
  14. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research by David Maynor (Paperback - Oct 2, 2007)
  15. Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices by Max Schubert (Paperback - Jun 2, 2008)
  16. Nessus Network Auditing, Second Edition by Mark Carey (Paperback - May 27, 2008)
  17. Netcat Power Tools by Jan Kanclirz, and Brian Baskin (Paperback - Jun 27, 2008)
  18. Network and System Security by John R. Vacca (Paperback - Mar 29, 2010)
  19. Network Security Architectures by Sean Convery (Hardcover - Apr 29, 2004)
  20. Network Security Assessment: From Vulnerability to Patch by Steve Manzuik, Andre Gold, and Chris Gatford (Paperback - Nov 7, 2006)
  21. Network Security Assessment: Know Your Network by Chris McNab (Paperback - Nov 1, 2007)
  22. Network Security Auditing (Networking Technology: Security)
  23. by Chris Jackson (Paperback - Jun 12, 2010)
  24. Network Warrior: Everything you need to know that wasn't on the CCNA exam by Gary A. Donahue (Paperback - Jun 1, 2007)
  25. Next Generation SSH2 Implementation: Securing Data in Motion by Max Caceres, Aaron E. Earle, Devin Ganger, and Wipul Jayawickrama (Paperback - Nov 28, 2008)
  26. Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, and Jason Andress (Paperback - Oct 8, 2010)
  27. Nmap in the Enterprise: Your Guide to Network Scanning by Angela Orebaugh, and Becky Pinkard (Paperback - Mar 14, 2008)
  28. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long (Paperback - Feb. 21, 2008)

Open source hacking :-
  1. Official Certified Ethical Hacker Review Guide by Steven DeFino and Barry Kaufman (Paperback - Nov. 9, 2009)
  2. Open Source Fuzzing Tools by Noam Rathaus, and Gadi Evron (Paperback - Dec 28, 2007)
  3. OS X Exploits and Defense: Own it...Just Like Windows or Linux! by Paul Baccas, Kevin Finisterre, Larry H., and David Harley (Paperback - Apr 25, 2008)
  4. OS X for Hackers at Heart by Bruce Potter, Chris Hurley, Johnny Long, and Tom Owad (Paperback - Nov. 19, 2005)
  5. - Illustrated OSSEC Host-Based Intrusion Detection Guide by Andrew Hay, Daniel Cid, and Rory Bray (Paperback - Mar 17, 2008)
  6. PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Dr. Anton Chuvakin, and Branden R. Williams (Paperback - Dec 15, 2009)
  7. Penetration Tester's Open Source Toolkit, Vol. 2 - Paperback (Nov. 30, 2007)
  8. by Jeremy Faircloth and Chris Hurley Penetration Testing and Network Defense by Andrew Whitaker, and Daniel Newman (Paperback - Nov 10, 2005)
  9. Penetration Testing: Communication Media Testing (Ec-Council Press Series: Certified Security Analyst)
  10. by EC-Council (Paperback - Jun 23, 2010)
  11. Penetration Testing: Network & Perimeter Testing (Ec-Council/ Certified Security Analyst)
  12. by EC-Council (Paperback - May 4, 2010)
  13. Penetration Testing: Network Threat Testing (Ec-Council Press Series: Certified Security Analyst)
  14. by EC-Council (Paperback - Jun 23, 2010)
  15. Penetration Testing: Procedures & Methodologies (Ec-Council/ Certified Security Analyst)
  16. by EC-Council (Paperback - May 4, 2010)
  17. Penetration Testing: Security Analysis (Penetration Testing: Ec-Council/ Press Series: Certified Security Analyst)
  18. by EC-Council (Paperback - Apr 5, 2010)
  19. Perfect Password: Selection, Protection, Authentication by Mark Burnett, and Dave Kleiman (Paperback - Dec 25, 2005)
  20. Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring by Harlan Carvey (Paperback - Dec 26, 2007)
  21. Phishing Exposed by Lance James (Paperback - Jan 20, 2006)
  22. Practical Cryptography by Niels Ferguson, and Bruce Schneier (Paperback - Mar 28, 2003)
  23. Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century - Paperback (July 4, 2009)
  24. by Ryan Trost Practical Oracle Security: Your Unauthorized Guide to Relational Database Security by Josh Shaul, and Aaron Ingram (Paperback - Nov 26, 2007)
  25. Practical VoIP Security by Thomas Porter, Jan Kanclirz Jr., and Brian Baskin (Paperback - Jun 10, 2006)
  26. Professional Pen Testing for Web Applications (Programmer to Programmer)
  27. by Andres Andreu (Paperback - Jul 5, 2006)
  28. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab by Thomas Wilhelm (Paperback - Aug 28, 2009)
  29. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking by Raoul Chiesa, Stefania Ducci, and Silvio Ciappi (Paperback - Dec 11, 2008)
  30. Real Digital Forensics: Computer Security and Incident Response by Keith J. Jones, Richard Bejtlich, and Curtis W. Rose (Paperback - Oct 3, 2005)
  31. Reversing: Secrets of Reverse Engineering by Eldad Eilam (Paperback - Apr 15, 2005)

Rootkits :-
  1. Rootkits for Dummies (For Dummies (Computer/Tech)
  2. by Larry Stevenson, and Nancy Altholz (Paperback - Jan 30, 2007)
  3. Rootkits: Subverting the Windows Kernel by Greg Hoglund, and Jamie Butler (Paperback - Aug 1, 2005)
  4. Router Security Strategies: Securing IP Network Traffic Planes by Gregg Schudel, and David J. Smith (Paperback - Jan 8, 2008)
  5. Sarbanes-Oxley IT Compliance Using Open Source Tools, Second Edition by Christian B Lahti, and Roderick Peterson (Paperback - Dec 28, 2007)
  6. Sarbanes-Oxley For Dummies by Jill Gilbert Welytok (Paperback - Feb 26, 2008)
  7. Schneier on Security by Bruce Schneier (Hardcover - Sep 29, 2008)
  8. Secrets and Lies: Digital Security in a Networked World by Bruce Schneier (Paperback- Jan 30, 2004)
  9. Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century by Christopher Burgess (Paperback - Mar 19, 2008)
  10. Secure Your Network for Free by Eric Seagren (Paperback - Feb 15, 2007)
  11. Securing IM and P2P Applications for the Enterprise by Marcus Sachs, Paul Piccard, Brian Baskin, and George Spillman (Paperback - May 1, 2005)
  12. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures by Peter Thermos, and Ari Takanen (Paperback - Aug 11, 2007)
  13. Security Data Visualization: Graphical Techniques for Network Analysis by Greg Conti (Paperback - Oct 1, 2007)
  14. Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson (Hardcover - Apr 14, 2008)
  15. Security Log Management: Identifying Patterns in the Chaos by Jacob Babbin, Dave Kleiman, Everett F. Carter Jr., and Jeremy Faircloth (Paperback - Apr 13, 2006)
  16. Security Metrics: Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith (Paperback - Apr 5, 2007)
  17. Security Monitoring with Cisco Security MARS by Gary Halleen, and Greg Kellogg (Paperback - Jul 16, 2007)
  18. Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks by Chris Fry, and Martin Nystrom (Paperback - Feb 16, 2009)
  19. Security Threat Mitigation and Response: Understanding Cisco Security MARS by Dale Tesch, and Greg Abelar (Paperback - Oct 8, 2006)
  20. Security Warrior by Cyrus Peikari, and Anton Chuvakin (Paperback - Feb 1, 2004)
  21. Self-Defending Networks: The Next Generation of Network Security by Duane De Capite (Paperback - Sep 10, 2006)
  22. Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal Zalewski (Paperback - Apr 15, 2005)
  23. Snort IDS and IPS Toolkit (Jay Beale's Open Source Security)
  24. by Brian Caswell, Jay Beale, and Andrew Baker (Paperback - Feb 1, 2007)
  25. Social Engineering: The Art of Human Hacking by Christopher Hadnagy (Paperback - Dec 8, 2010)
  26. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James C Foster (Paperback - Apr 26, 2005)

More Cyberwar related books :-
  1. Software Piracy Exposed by Paul Craig, and Mark Burnett (Paperback - May 1, 2005)
  2. Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day by Ira Winkler (Hardcover - Apr 8, 2005)
  3. SQL Hacks by Andrew Cumming, and Gordon Russell (Paperback - Nov 21, 2006)
  4. SQL Injection Attacks and Defense by Justin Clarke (Paperback - May 15, 2009)
  5. SQL Server Forensic Analysis by Kevvie Fowler (Paperback - Dec 26, 2008)
  6. Steal This Computer Book 4.0: What They Won't Tell You about the Internet by Wallace Wang (Paperback - Apr. 15, 2006)
  7. Stealing the Network: How to Own a Continent by FX, Paul Craig, Joe Grand, and Tim Mullen (Paperback - May 2004)
  8. Stealing the Network: How to Own a Shadow by Johnny Long, Timothy Mullen, and Ryan Russell (Paperback - Feb 15, 2007)
  9. Stealing the Network: How to Own an Identity by Ryan Russell, Riley Eller, Jay Beale, and Chris Hurley (Paperback - May 1, 2005)
  10. Stealing the Network: How to Own the Box by Ryan Russell, Ido Dubrawsky, FX, and Joe Grand (Paperback - May 29, 2003)
  11. Surviving Cyberwar by Richard Stiennon (Paperback - Jul 16, 2010)
  12. Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook by Jack Wiles (Paperback - Oct 23, 2007)
  13. Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators by Jack Wiles, Johnny Long (Paperback - Mar 26, 2007)
  14. Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure by Jack Wiles (Paperback - Jul 30, 2008)
  15. The Art of Computer Virus Research and Defense by Peter Szor (Paperback - Feb 13, 2005)
  16. The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, and Steve Wozniak (Paperback - Oct 17, 2003)
  17. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, and William L. Simon (Paperback - Dec 27, 2005)
  18. The Art of Software Security Testing: Identifying Software Security Flaws by Chris Wysopal, Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin (Paperback - Nov 27, 2006)
  19. The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein (Hardcover - July 28, 2008)
  20. The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L. Krutz, and Russell Dean Vines (Hardcover - Oct 22, 2007)
  21. The Dark Visitor (paperback)
  22. (Unknown Binding - Jan 1, 2007)
  23. The Database Hacker's Handbook: Defending Database Servers by David Litchfield, Chris Anley, John Heasman, and Bill Grindlay (Paperback - Jul 14, 2005)
  24. The dotCrime Manifesto: How to Stop Internet Crime by Phillip Hallam-Baker (Hardcover - Jan 8, 2008)
  25. The Ethical Hack: A Framework for Business Value Penetration Testing by James S. Tiller (Hardcover - Sep 29, 2004)
  26. The Insider: A True Story by Dan Verton (Hardcover - Jun 24, 2005)
  27. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments by Craig Wright (Paperback - Jul 4, 2008)
  28. The Mezonic Agenda: Hacking the Presidency by Herbert Thomson (Paperback - Oct 7, 2004)
  29. The Myths of Security: What the Computer Security Industry Doesn't Want You to Know by John Viega (Paperback - Jun 19, 2009)

Security :-
  1. The New School of Information Security by Adam Shostack, and Andrew Stewart (Hardcover - Apr 5, 2008)
  2. The Official CHFI Study Guide (Exam 312-49)
  3. : for Computer Hacking Forensic Investigator by Dave Kleiman (Paperback - Oct 8, 2007)
  4. The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System by Bill Blunden (Paperback - May 4, 2009)
  5. The Tao of Network Security Monitoring: Beyond Intrusion Detection - Paperback (July 22, 2004)
  6. by Richard Bejtlich The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto (Paperback - Oct. 22, 2007)
  7. Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp and Kevin Mitnick (Paperback - Sept. 22, 2009)
  8. UNIX and Linux Forensic Analysis DVD Toolkit by Chris Pogue, Cory Altheide, and Todd Haverkos (Paperback - Jun 30, 2008)
  9. Virtual Honeypots: From Botnet Tracking to Intrusion Detection by Niels Provos, and Thorsten Holz (Paperback - Jul 26, 2007)
  10. Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments by Diane Barrett, and Greg Kipper (Paperback - Jun 1, 2010)
  11. Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting by John Hoopes (Paperback - Dec 26, 2008)
  12. Voice over IP Security by Patrick Park (Paperback - Sep 19, 2008)
  13. WarDriving and Wireless Penetration Testing by Chris Hurley, Russ Rogers, Frank Thornton, and Brian Baker (Paperback - Jan 15, 2007)
  14. Web Application Vulnerabilities: Detect, Exploit, Prevent by Steven Palmer (Paperback - Dec. 28, 2007)
  15. Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast by Paco Hope, and Ben Walther (Paperback - Oct 17, 2008)
  16. Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition)
  17. by Andrew Vladimirov, Konstantin V. Gavrilenko, and Andrei A. Mikhailovsky (Paperback - Jul 28, 2008)
  18. Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan A. Carvey (Paperback - Jun 11, 2009)
  19. Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
  20. by Angela Orebaugh, Gilbert Ramirez, and Jay Beale (Paperback - Feb 14, 2007)
  21. Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide by Laura Chappell, and Gerald Combs (Paperback - Mar 15, 2010)
  22. Writing Security Tools and Exploits - Paperback - Illustrated (Mar. 11, 2006)
  23. by James C. Foster XSS Attacks: Cross Site Scripting Exploits and Defense by Seth Fogie, Jeremiah Grossman, Robert Hansen, and Anton Rager (Paperback - May 15, 2007)
  24. Zen and the Art of Information Security by Ira Winkler (Paperback - Mar 1, 2007)
  25. Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction)
  26. by Rob Shein, David Litchfield, and Marcus Sachs (Paperback - Aug 4, 2004)
  27. Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity by Byron Acohido, and Jon Swartz (Hardcover - Apr 1, 2008)


Leave a Reply

Subscribe to Posts | Subscribe to Comments

Pageviews

Followers

Blog Archive

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -