2013 Security Reading List

reading_owlDuring the second week of December I realized that our group had not used their 2012 training budget. Realizing that there was not enough time to get a formal security class under way before the end of the year, I suggested to my manager that our group use the funds to order security-related books. He gave us the green light and behold the list below. Goal is to finish them by December 31, 2013. We’ll see what happens.

Security Analysis: Principles and Technique
White-Hat Security Arsenal: Tackling the Threats
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Defense Against The Black Arts: How Hackers Do What They Do And How To Protect Against It
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
The Implementation (TCP/IP Illustrated, Volume 2)
TCP/IP Illustrated, Volume 1: The Protocols
Security and Access Control Using Biometric Technologies
Cisco IOS Access Lists
Social Engineering: The Art of Human Hacking
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
Securing The Cloud: Cloud Computer Security Techniques And Tactics
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
CEH Certified Ethical Hacker All-In-One Exam Guide [With CDROM]
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Gray Hat Hacking the Ethical Hackers Handbook
Hacking: The Art of Exploitation
Metasploit: The Penetration Tester’s Guide

Leave a comment ?

0 Comments.

Leave a Comment


NOTE - You can use these HTML tags and attributes:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>