Books

From aldeid
Jump to: navigation, search
Book Title / Author Review
Wifoo2.png

WI-FOO II
Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky

Hacking-the-art-of-exploitation2.png

HACKING - THE ART OF EXPLOITATION, 2ND EDITION
Jon Erickson

The-web-application-hackers-handbook.png

THE WEB APPLICATION HACKER'S HANDBOOK - DISCOVERING AND EXPLOITING SECURITY FLAWS
Dafydd Stuttard, Marcus Pinto

Counter-hack-reloaded-a-step-by-step-guide-to-computer-attacks-and-effective-defenses.png

COUNTER HACK RELOADED - A STEP BY STEP GUIDE TO COMPUTER ATTACKS AND EFFECTIVE DEFENSES, 2ND EDITION
Ed Skoudis, Tom Liston

  • This book is really excellent!
  • Reminders on OSI model, IP addresses, netmasks.
  • Attacks explained step by step
The-hackers-handbook-the-strategy-behind-breaking-into-and-defending-networks.png

THE HACKER'S HANDBOOK - THE STRATEGY BEHIND BREAKING INTO AND DEFENDING NETWORKS
Susan Young, Dave Aitel

Google-hacking-for-penetration-testers-2.png

GOOGLE HACKING FOR PENETRATION TESTERS, VOLUME 2
Johnny Long

The-tao-of-network-security-monitoring-beyond-intrusion-detection.png

THE TAO OF NETWORK SECURITY MONITORING - BEYOND INTRUSION DETECTION
Richard Bejtlich

The reference for NSM (Network Security Monitoring)
Practical-hacking-techniques-and-countermeasures.png

PRACTICAL HACKING TECHNIQUES AND COUNTERMEASURES
Mark D. Spivey

  • A detailed lexicon of most common hacking tools
  • Certain tools are missing from my point of view, but it is impossible to list all tools ;-)
Exam-prep-certified-ethical-hacker.png

CERTIFIED ETHICAL HACKER - EXAM PREP
Michael Gregg

Ethical-hacking-prepares-you-for-ec-council-exam-312-50.png ETHICAL HACKING - PREPARES YOU FOR EC COUNCIL EXAM 312-50 - OFFICIAL COURSE MATERIAL
Hack-attacks-revealed-a-complete-reference-with-custom-security-hacking-toolkit.png

HACK ATTACK REVEALED - A COMPLETE REFERENCE WITH CUSTOM SECURITY HACKING TOOLKIT
John Chirillo

Gray-hat-hacking-the-ethical-hackers-handbook.png

GRAY HAT HACKING - THE ETHICAL HACKER'S HANDBOOK
Shon Harris, Allen Harper, Jonathan Ness, Chris Eagle

Hacking-exposed-network-security-secrets-and-solutions.png

HACKING EXPOSED - NETWORK SECURITY SECRETS AND SOLUTIONS, 6TH EDITION
Stuart McClure, Joel Scambray, George Kurtz

Preventing-web-attacks-with-apache.png

PREVENTING WEB ATTACKS WITH APACHE
Ryan C. Barnett

Modsecurity-2.5-securing-your-apache-installation-and-web-applications.png

MODSECURITY 2.5 - SECURING YOUR APACHE INSTALLATION AND WEB APPLICATIONS
Magnus Mischel

Nmap-network-scanning.png

NMAP NETWORK SCANNING
Fyodor

Absolute reference to discover all the secrets of Nmap!
Practical-Malware-Analysis.png

PRACTICAL MALWARE ANALYSIS
Michael Sikorski, Andrew Honig

The best book ever for Malware Analysts. Comes with a lot of practical examples
Malware-Analyst-s-Cookbook.png

MALWARE ANALYST'S COOKBOOK
Michael Hale Ligh, Steven Adair, Blake Harstein, Matthew Richard

Excellent book for Malware Analysts. Comes with a lot of scripts to help the analyst in his daily job
Reversing-secrets-of-reverse-engineering.png

REVERSING - SECRETS OF REVERSE ENGINEERING
Eldad Eilam

Should you need to learn assembly language and reverse engineering, I would warmly recommend this book