Application Security Books
The Web Application Hackers Handbook 2nd Edition
The
Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
The
Basics of Web Hacking Tools and Techniques to Attack the Web
Web
Application Vulnerabilities: Detect, Exploit, Prevent
Web
Security: A WhiteHat Perspective
Foundations
of Security: What Every Programmer Needs to Know (Expert’s Voice)
Software
Security: Building Security In
The
Art of Software Security Assessment: Identifying and Preventing Software
Vulnerabilities
The
Database Hacker’s Handbook: Defending Database Servers
Web
2.0 Security – Defending AJAX, RIA, AND SOA
Web
Services Security
SQL
Injection Attacks and Defense
The
Browser Hackers Handbook
Web
Application Obfuscation ‘-WAFs..Evasion..Filtersalert(Obfuscation)-’
Web
Penetration Testing with Kali Linux
How
to Attack and Defend Your Website, 1st Edition
Python
Web Penetration Testing Cookbook
Networking Books
Computer Networks (5th Edition) - Andrew S. Tanenbaum
Data
Communications and Computer Networks - A Business User’s Approach, 7th Edition
Essential
Guide to Telecommunications
Guide
to Networking Essentials, 6th Edition
Mission
Critical Network Planning
Network+
Guide to Networks
Networking
A Beginners Guide, 6th Edition.
Networking
All-in-One Desk Reference For Dummies
Networking
for Dummies, 10 Edition
The
Practice of System and Network Administration
Learning
OpenStack Networking (Neutron)
Linux
Networking Cookbook
Understanding
Linux Network Internals
Mastering
Linux Network Administration
Networking
Essentials A CompTIA Network+ N10-006 Textbook, 4th Edition
Learning Proxmox VE
IT Administration Books
Mastering Microsoft Lync Server 2013
Mastering
Microsoft Exchange Server 2013
Mastering
Windows Server 2012 R2
Windows
Server 2012 Hyper-V Installation and Configuration Guide
MCSA
Windows Server 2012 Complete Study Guide: Exams 70-410, 70-411, 70-412, and
70-417
Group
Policy: Fundamentals, Security, and the Managed Desktop by Jeremy Moskowitz
Red
Hat Enterprise Linux Server Cookbook
Computer Security and Hacking Books
(In
this category, you can find eBooks related to subcategories such as computer
security in general, network security, network defense, hacking in general,
network hacking…)
Z4ck – Bypass Any Network Security!
Network
Security Essentials: Applications and Standards (4th Edition)
Counter
Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
(2nd Edition)
Nmap
Network Scanning: The Official Nmap Project Guide to Network Discovery and
Security Scanning
Nmap
6 Network Exploration and Security Auditing Cookbook
Nmap
Network Discovery III
Mastering
the Nmap Scripting Engine
Basics
of Information Security, The, Second Edition - Andress, Jason
Basic
Security Testing with Kali Linux
Getting
Started with Windows Server Security
pfSense
2 Cookbook
Simple
Steps to Data Encryption: A Practical Guide to Secure Computing
Metasploit
Pentesting Guide
Ethical
Hacking and Penetration Testing Guide
Network
Security, Firewalls, and VPNs
Metaspoitable
2 Unleashed Online tutorial
Penetration
Tester's Open Source Toolkit
Anti-Hacker
Tool Kit, 4th Edition
Conducting
Network Penetration and Espionage in a Global Environment
Computer
Security Handbook, 6th Edition
Cybersecurity
- Managing Systems, Conducting Testing, and Investigating Intrusions
Defense
against the Black Arts
Mastering
Kali Linux for Advanced Penetration Testing
Dissecting
the Hack - The F0rb1dd3n Network (2010)
Dissecting
the Hack - The F0rb1dd3n Network, Revised Edition
Fundamentals
of Information Systems Security
Hacker
Techniques, Tools, and Incident Handling
Hackers
- Heroes of the computer evolution, Steven Levy
Hackers
Beware - Defending your Network
Hacking
- Firewalls And Networks How To Hack Into Remote Computers
Hacking
For Dummies, 4th Edition
Hacking
The Art Of Exploitation, 2nd Edition
Hacking
with Kali - Practical Penetration Testing Techniques
Information
Security - The Complete Reference , 2nd Edition
Information
Security Fundamentals, Second Edition - Peltier, Thomas
Instant
Penetration Testing- Setting Up a Test Lab How-to
Kali
Linux Cookbook
Kali
Linux Social Engineering
Kali
Linux CTF Blueprints
Kali
Linux Network Scanning Cookbook
Learning
Nessus for Penetration Testing
Network
Security, Administration and Management Advancing Technologies and Practice
Network
Security, Firewalls, and VPNs
Penetration
Testing - A Hands-On Introduction to Hacking (2014)
Penetration
Testing With The Bash Shell
Professional
Penetration Testing - Creating and Operating a Formal Hacking Lab, 2nd Edition.
RTFM
- Red Team Field Manual v3
Security
Careers Skills, Compensation, and Career Paths, 3rd edition
Practical
Hacking - Techniques and Countermeasures - M.Spivey
Practical
Intrusion Analysis
Practical
Packet Analysis Using Wireshark to Solve Real-World Network Problems
Network
Analysis Using Wireshark Cookbook
Wireshark
- Essential Skills for Network Analysis
Wireshark
Network Analysis (Second Edition) Network Analyst Study Guide
Extrusion
Detection: Security Monitoring for Internal Intrusions
Crafting
the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
The
Tao Of Network Security Monitoring - Beyond Intrusion Detection (2004)
Applied
Network Security Monitoring
The
Basics of Hacking and Penetration Testing - Ethical Hacking and Penetration
Testing Made Easy
The
Basics of Information Security: Understanding the Fundamentals of InfoSec in
Theory and Practice
SSL
- Man In The Middle Attack
Stealing
the Network - How to Own a Continent
Stealing
the Network - How to Own a Shadow
Stealing
the Network - How to Own the Box
TCP-IP
Tutorial and Technical Overview
The
Hacker Playbook, Practical Guide To Penetration Testing
The
Hacker Playbook 2, Practical Guide To Penetration Testing
The
Hacker's Underground Handbook.
Advances
In Computers - Information Security
Advances
in Security of Information and Communication Networks
Anti-Hacker
Tool Kit, Third Edition
Network
Security by Andre Perez
Attack
and Defend Computer Security Set
BackTrack
5 Cookbook
Basics
of Hacking and Penetration Testing, 2nd Edition
Build
Your Own Security Lab A Field Guide for Network Testing
Building
Virtual Pentesting Labs for Advanced Penetration Testing
Ninja
Hacking - Unconventional Penetration Testing Tactics and Techniques
Gray
Hat Hacking - The Ethical Hackers Handbook, 2nd Edition
Gray
Hat Hacking - The Ethical Hackers Handbook, 3rd Edition
Gray
Hat Hacking - The Ethical Hackers Handbook, 4th Edition
BackTrack
4: Assuring Security by Penetration Testing
Kali
Linux: Assuring Security by Penetration Testing
Metasploit
Penetration Testing Cookbook, 2nd Edition
Metasploit
The Penetration Tester’s Guide
Ninja
Hacking Unconventional Penetration Testing Tactic and Techniques
Stealing
the Network: How to own the box
Advanced
Penetration Testing for Highly-Secured Environments
Network
Security Hacks, 2nd Edition
Mastering
Metasploit - RAW
Maximum
Security - A Hacker's Guide to Protecting Your Internet Site and Network
Advanced
Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Blue
Team Handbook: Incident Response Edition: A condensed field guide for the Cyber
Security Incident Responder
The
Antivirus Hacker's Handbook
The
Car Hacker's Handbook
The
Network Security Test Lab: A Step-by-Step Guide
Wireshark
Network Security
OpenStack
Cloud Security
Instant
Kali Linux
Intermediate
Security Testing with Kali Linux 2
Cyber
Operations: Building, Defending, and Attacking Modern Computer Networks
Network
Attacks and Defenses A Hands-on Approach
Hacker's
Challenge I, II, III Series
Introduction
to Network Security: Theory and Practice
Nmap
Essentials
Principles of Information Security
Security
Sage's Guide to Hardening the Network
Malware,
Rootkits & Botnets A Beginner's Guide
Wireless Network Security Books
BackTrack 5 Wireless Penetration Testing Guide
Backtrack
- Testing Wireless Network Security
Kali
Linux: Wireless Penetration Testing Beginner's Guide
Wireless
Security - Know It All
Installing
Troubleshooting and Repairing Wireless Networks
Hacking
Wireless Networks For Dummies
Intrusion
Detection in Wireless Ad-Hoc Networks - Chaki, Nabendu & Rituparna
802.11
Wireless Networks - The Definitive Guide, 2nd Edition
802.11
Wireless Networks Security and Analysis
Wireless
Communication and Networks -2nd Edition, William Stallings
Mastering
Wireless Penetration Testing for Highly-Secured Environments
Wireless
Design & Development
Wireless
Network Administration A Beginner's Guide
Wireless
Network Hacks & Mods for Dummies
Wireless
Networks and Security - Pathan, Springer
Wireless
Reconnaissance in Penetration Testing
Wireless
Security - Know It All
Security
for Multihop Wireless Networks
Wi-Foo
- The Secrets Of Wireless Hacking
WirelessNetSec
by PaulDotCom
Mastering
Kali Linux Wireless Pentesting
Forensics
Books
Computer Forensics with FTK
Network
Forensics: Tracking Hackers Through Cyberspace
Violent
Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and
Security Engineers
Mastering
Windows Network Forensics and Investigation, 2nd Edition
Guide
to Computer Forensics and Investigations, 4th Edition
Guide
to Computer Forensics and Investigations, 5th Edition
Real
Digital Forensics: Computer Security and Incident Response
File
System Forensic Analysis
Mastering
Python Forensics
Digital
Forensics - Threatscape and Best Practices
Operating
System Forensics
Windows
Registry Forensics, 2nd Edition
Computer
Forensics InfoSec Pro Guide
Exploitation and Vulnerability Research Books
The Shellcoder’s Handbook: Discovering and Exploiting Security
Holes
Reversing:
Secrets of Reverse Engineering
Practical
Reverse Engineering
The
Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Hacking:
The Art of Exploitation, 2nd Edition
No
Starch Press Practical Malware Analysis
Windows
Malware Analysis Essentials
Malware
Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Windows
Malware Analysis Essentials
Malware
and Computer Security Incidents: Handling Guides
Metasploit
Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Learning
Metasploit Exploitation and Development
The
Mac Hacker’s Handbook
Rootkits:
Subverting the Windows Kernel
The
IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler
Exploiting
Software: How to Break Code
Advanced
Windows Debugging
Buffer
Overflow Attacks: Detect, Exploit, Prevent
Writing
Security Tools and Exploits
A
Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
The
Art of Software Security Testing: Identifying Software Security Flaws
Fuzzing:
Brute Force Vulnerability Discovery
The
Art of Software Security Assessment: Identifying and Preventing Software
Vulnerabilities
Sockets,
Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding
for Security Professionals
Programming Books
Gray Hat Python: Python Programming for Hackers and Reverse
Engineers
Foundations
of Python Network Programming Second Edition
Python
Cookbook, 2nd Edition
Python
Network Programming Cookbook
Python
for Secret Agents
Black
Hat Python: Python Programming for Hackers and Pentesters
Linux
Shell Scripting Cookbook, 2nd Edition
Mastering
Linux Shell Scripting
Linux
Shell Scripting Essentials
Physical/Technical Security Books
Digital Video Surveillance and Security
Intelligent
Network Video; Understanding Modern Video Surveillance Systems
Cryptography Books
Applied Cryptography: Protocols, Algorithms, and Source Code in C,
Second Edition
Cryptography
Engineering: Design Principles and Practical Applications
Cryptography
Demystified
General Security Management
Information Security: Principles and Practices
Corporate
Computer and Network Security (2nd Edition)
Security
Policies and Procedures: Principles and Practices
Managing
Information Security
Springer
Security and Intelligent Information Systems
Access
Denied The Practice and Policy of Global Internet Filtering
Seven Deadliest Attacks Books
Seven Deadliest Wireless Technologies Attacks By Brad Haines
Seven
Deadliest Web Application Attacks By: Mike Shema
Seven
Deadliest USB Attacks By: Brian Anderson, Barbara Anderson
Seven
Deadliest Network Attacks By: Stacy Prowell, Rob Kraus
Seven
Deadliest Unified Communications Attacks By: Dan York
Seven
Deadliest Social Network Attacks By: Carl Timm, Richard Perez
Seven
Deadliest Microsoft Attacks By: Rob Kraus, Mike Borkin
Hacking Exposed Books
Hacking Exposed Network Security Secrets and Solutions, Seventh
Edition
Hacking
Exposed Web Applications, Third Edition
Hacking
Exposed Wireless: Wireless Security Secrets and Solutions, Third Edition
Hacking
Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking
Exposed Linux: Linux Security Secrets and Solutions
Hacking
Exposed Unified Communications & VoIP Security Secrets &
Solutions, Second Edition
Hacking
Exposed Computer Forensics: Computer Forensics Secrets & Solutions,
Second Edition
Hacking
Exposed Malware & Rootkits: Security Secrets and Solutions, Second
Edition
Hacking
Exposed Web 2.0
EC-Council Press Books
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile
Systems by EC-Council
Ethical
Hacking and Countermeasures: Attack Phases by EC-Council
Ethical
Hacking and Countermeasures: Web Applications and Data Servers by EC-Council
Ethical
Hacking and Countermeasures: Threats and Defense Mechanisms by EC-Council
Ethical
Hacking and Countermeasures: Secure Network Infrastructures by EC-Council
Penetration
Testing: Communication Media Testing, Vol. 4 by EC-Council
Penetration
Testing: Network & Perimeter Testing by EC-Council
Penetration
Testing: Network Threat Testing EC-Council
Penetration
Testing: Security Analysis by EC-Council
Penetration
Testing: Procedures & Methodologies by EC-Council
Network
Defense: Securing and Troubleshooting Network Operating Systems by EC-Council
Network
Defense: Security and Vulnerability Assessment by EC-Council
Network
Defense: Security Policy and Threats by EC-Council
Network
Defense: Fundamentals and Protocols by EC-Council
Network
Defense: Perimeter Defense Mechanisms by EC-Council
Computer
Forensics: Evidence Collection and Preservation by EC-Council
Computer
Forensics: Investigating Hard Disks, File & Operating Systems by
EC-Council
Computer
Forensics: Investigating Data and Image Files by EC-Council
Computer
Forensics: Investigating Wireless Networks and Devices by EC-Council
Computer
Forensics: Investigating Network Intrusions and Cyber Crime by EC-Council
Certification
Books
Cisco CCNA Routing and Switching 200-120 Official Cert Guide
Library
Cisco
CCNA Routing and Switching ICND2 200-101 Official Cert Guide
Cisco
CCNA Study Guide, 6th Edition
CCNA
Security 640-554 Official Cert Guide
Cisco
CCNA Wireless 640-722 Official Cert Guide
Cisco
CCNP Security IPS 642-627 Official Cert Guide
Cisco
CCNP Security Secure 642-637 Official Cert Guide
Cisco
CCNP Security VPN 642-648 Official Cert Guide, 2nd Edition
Cisco
CCNP Security FIREWALL 642-618 Official Cert Guide
CISSP
All-in-One Exam Guide, 6th Edition
CompTIA
A+ Authorized Exam Cram, 6th Edition (Exams 220-801 & 220-802)
CompTIA
A+ Certification All-in-One Exam Guide, 8th Edition - (220-801 &
220-802)
CompTIA
A+ Complete Review Guide
CompTIA
A+ Complete Study Guide - (220-701 & 220-702)
CompTIA
A+ Rapid Review 2013.pdf"
CompTIA
A+Training Kit Exam 220-801 and Exam 220-802
CompTIA
Advanced Security Practitioner
CompTIA
Linux+ Study Guide 2013 - Exams LX0-101 and LX0-102, 2nd Edition
CompTIA
Network+ N10-005 Authorized Cert Guide
CompTIA
Network+ N10-005 Authorized Exam Cram, 4th Edition
CompTIA
Network+ N10-006 Cert Guide
CompTIA
Network+ Study Guide - Fourth Edition
CompTIA
Network+ Study Guide
CompTIA
Security+ Get Certified Get Ahead - Gibson, Darril
CompTIA
Security+ Study Guide Exam SY0-301 (5th Edition)
CompTIA
Security+ Study Guide SY0-401, 6th Edition
CompTIA
Security+ SY0-301 Authorized Exam Cram, 3rd Edition Pearson
CompTIA
Security+: Get Certified Get Ahead: SY0-201 Study Guide
CISSP
All-in-One Exam Guide, Fifth Edition
Official
(ISC)2 Guide to the CISSP CBK, Second Edition ((ISC)2 Press)
Mike
Meyers’ CISSP(R) Certification Passport
CEH
Certified Ethical Hacker Study Guide
CEH
Certified Ethical Hacker Practice Exams, 2nd Edition
CEH
v8 Certified Ethical Hacker All-in-One Exam Guide, Second Edition by Matt Walker
The
Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic
Investigator
Ethical
Hacking Official Guide from EC Council
Offensive
Security - BackTrack to the Max Cracking the Perimeter V 1.0
Offensive
Security - Basics of Backtrack
Offensive
Security - Metasploit Unleashed
Offensive
Security - Penetration Testing with BackTrack (Lab Guide) v3.2
Offensive
Security - Wireless Attacks ( WiFu) v3.0
Official
(ISC)2® Guide to SSCP CBK, Second Edition
Official
(ISC)2® Guide to the CCFP CBK
(New books are yet to be released and this
list will be updated when required!)
Publishers: Syngress, No Starch
Press, Packt Publishing, O’reilly Media, Sybex, Wiley…
0 comments:
Post a Comment