|
Security Book Reviews |
|
|
Here is the monthly review of some of the top security books for you. |
|
|
|
Title: A Bug Hunter's Diary |
Author: Tobias Klein |
Rating:
|
|
|
|
This in not just a book that will teach you the Art of Bug Hunting in most spectacular way but an great inspiration to all those wanna be Bug Hunters!. |
|
Read More |
|
|
Title: BackTrack 5 Wireless Penetration Testing |
Author: Vivek Ramachandran |
Rating:
|
|
|
|
Written by wireless expert, this book goes beyond the words
and highly recommended to anyone willing to master Wi-Fi
Kung Fu. |
|
Read More |
|
|
Title: Metasploit: The Penetration Tester's Guide |
Author: David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni |
Rating:
|
|
|
|
Highly recommended by HD Moore - the Creator himself, you don't need second recommendation for this great book ! |
|
Read More |
|
|
Title: Windows Registry Forensics |
Author: Harlan A. Carvey |
Rating:
|
|
|
|
This is the must have book for any Windows Forensic Analyst !!! |
|
Read More |
|
|
Title: IDA PRO Book - 2nd Edition |
Author: Chris Eagle |
Rating:
|
|
|
|
Hailed by Ilfak Guilfanov - the creator of IDA Pro himself,
this book is highly recommended for any one on IDA !
|
|
Read More |
|
|
Title: Practical Lock Picking: A Physical Penetration
Tester's Training Guide |
Author: Deviant Ollam |
Rating:
|
|
|
|
Invaluable guide for anyone interested in mastering 'Lock-Picking' !
|
Read More |
|
|
Title: BackTrack 4: Assuring Security by Penetration Testing |
Author: Shakeel Ali & Tedi Heriyanto |
Rating:
|
|
|
|
This is a invaluable guide to wanna be Penetration Testers
and handy reference for experts !
|
Read More |
|
|
Title: The Art of Computer Virus Research and Defense |
Author: Peter Szor |
Rating:
|
|
|
|
This is by far the most comprehensive text available on
Virus straight from the expert !
|
Read More |
|
|
|
|
Title: Kingpin - How One Hacker Took Over the Billion-Dollar
Cybercrime Underground |
Author: Kevin Poulsen |
Rating:
|
|
|
|
Here is the yet another but superb and thrilling
real tale from the Hackers underground !
|
Read More |
|
|
|
|
Title: Android in Action |
Author: Frank Ableson, Robi Sen |
Rating:
|
|
|
|
This is the master class book on 'Android
Programming' either you are beginner or expert !
|
Read More |
|
|
|
|
Title: Social Engineering: The Art of Human Hacking |
Author: Christopher Hadnagy, Paul Wilson |
Rating:
|
|
|
|
This is the BEST book published so far on 'Social
Engineering' and must get into your book-shelf if
you are the one who look beyond the human face!
|
Read More |
|
|
|
|
Title: A Guide to Kernel Exploitation |
Author: Enrico Perla, Massimiliano Oldani |
Rating:
|
|
|
|
This is a great source to begin your journey into Kernel exploitation and well worth the price it is set for !
|
Read More |
|
|
|
|
Title: Malware Analyst's Cookbook and DVD |
Author: Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard |
Rating:
|
|
|
|
Latest master piece in the Malware Analysis field which
covers almost all facets of the subject from all possible
angles. Highly recommended !
|
Read More |
|
|
|
|
Title: Mobile Malware Attacks and Defense |
Author: Ken Dunham |
Rating:
|
|
|
|
This book offers one of best insights on mobile malwares,
their trends, analysis and protections against such threats
for novice as well as experts.!
|
Read More |
|
|
Title: CISSP All-in-One Exam Guide (5th Edition) |
Author: Shon Harris |
Rating:
|
|
|
|
This book is one stop guide for any Security Professional to
clear the most acclaimed CISSP exam in one shot !
|
Read More |
|
|
Title: Cyber Fraud: Tactics, Techniques and Procedures |
Author: Rick Howard |
Rating:
|
|
|
|
Recommended for any one who would like to know in & out of
the Cyber crooks, their operations and the framework in
which they operate to make millions behind the lines.
|
Read More |
|
|
Title: Cloud Security & Privacy |
Author: Tim Mather, Subra Kumaraswamy & Shahed Latif |
Rating:
|
|
|
|
This is a must read for anyone either novice or expert who
wants to know everything about cloud computing and its
security paradigm.
|
Read More |
|
|
Title: Virtual Honeypots: From Botnet Tracking to Intrusion
Detection |
Author: Niels Provos, Thorsten Holz |
Rating:
|
|
|
|
This books cuts off all those rating levels to emerge as one
of the best written book on Honeypots and it is highly
recommended to anyone who wants to know everything about it.
|
Read More |
|
|
Title: Wireshark Network Analysis |
Author: Laura Chappell |
Rating:
|
|
|
|
Either you are on the air or wire there is no better tool
than Wireshark and there is no better book than this.
|
Read More |
|
|
Title: NMAP COOKBOOK - The Fat-free Guide to Network Scanning |
Author: Nicholas Marsh |
Rating:
|
|
|
|
This book does a great job in helping to master the
instrinsic technicalities of NMAP with its simplified and
concise illustrations.
|
Read More |
|
|
Title: Windows Forensic Analysis |
Author: Harlan Carvey |
Rating:
|
|
|
|
Harlan has produced this master piece on the Forensics
subject and it is highly recommended for any one willing to
acquire mastery over this field.
|
Read More |
|
|
Title : SQL Injection Attacks and Defense |
Author : Justin Clarke |
Rating :
|
Ebook :
https://rs59.rapidshare.com/files/293360186/1597494240.pdf |
|
|
|
Written by the experts the book covers from basic to
advanced levels and it is highly recommended for any one
involved in the web security.
|
Read More |
|
|
Title : Professional Penetration Testing |
Author : Thomas Wilhelm |
Rating :
|
Ebook :
https://rs221.rapidshare.com/files/356187584/1597494259_PenetrationA.rar |
|
|
|
Recommended book for anyone seriously willing to pursue his
career as Pentester.
|
Read More |
|
|
Title : The Myths of Security |
Author : John Viega |
Rating :
|
Ebook :
https://www.eazyupload.net/download/nSwv3S2l/0596523025.zip.htm |
|
|
|
This is another non-technical book which exposes the true & practical
realities of the security.This book is compilation of lot of security
facts which has the power of awakening any living soul. The facts which
are hard to agree and digest, but they are true to the point.
|
Read More |
|
|
Title : Zero Day Threat |
Author : Byron Acohido, Jon Swartz |
Rating :
|
Ebook :
Got a link? Let me know |
|
|
|
This book exposes the real myths of security by presenting the real
stories, real numbers and real people who drives the show...!
|
Read More |
|
|
Title : Writing Secure Code for Windows Vista |
Author : Michael Howard, David LeBlanc |
Rating :
|
Ebook :
Rapidshare_ebook_WritingSecureCodeForVista |
|
|
|
This is must have book for any security conscious developer to unleash the security defenses of Vista and Win 7.
|
Read More |
|
|
Title : Malware Forensics |
Author : Cameron H. Malin, Eoghan Casey, James M. Aquilina |
Rating :
|
|
|
|
Written by forensic experts from the field, this
book is the finest of all in exploring the art of Malware investigation
in clear and concise manner.
|
Read More |
|
|
Title : The Rootkit ARSENAL |
Author : Reverend Bill Blunden |
Rating :
|
|
|
|
By far this is the very good reference book ever produced on the darkest subjects of Computer security and very well recommended for any one who wants to conquer the mysterious world of Rootkits. |
Read More |
|
|
Title : Hacker's Challenge 3 - 20 Brand New Forensic Scenarios
& Solutions |
Author : David Pollino, Bill Pennington, Tony Bradley,
Himanshu Dwivedi |
Rating :
|
|
|
|
The 'Hackers Challenge book presents one of the best hacker stories you have ever read which not only makes it enjoyable to read but at the same time imparts the real knowledge.
|
Read More |
|
|
Title : Hacking - The Art of
Exploitation |
Author : Jon Erickson |
Rating :
|
|
|
|
The best practical book for any security professional to understand
as well as master the art of vulnerability exploitation.
|
Read More |
|
|
Title : 19 Deadly Sins of Software
Security |
Author : Michael Howard, David LeBlanc, John Viega |
Rating :
|
Ebook :
Ebook_link_19_Deadly_Sins_of_Software_Security |
|
|
|
Written by prominent authors, entire book is filled with rich
technical code samples which make it more insightful and valuable
resource for all coders out there.
|
Read More |
|
|
Title : Fuzzing: Brute Force Vulnerability Discovery |
Author : Michael Sutton, Adam Greene, Pedram Amini |
Rating :
|
Ebook :
Ebook_link_Fuzzing_Bruteforce_Vulnerability_Discovery |
|
|
|
This is the first ever book written on Fuzzing by prominent authors
who have mastered this field.
|
Read More |
|
|
Title : The Shellcoder's Handbook:
Discovering and Exploiting Security Holes |
Author : Jack Koziol, David Litchfield, Dave Aitel, Chris Anley,
Sinan, Neel Mehta, Riley Hassell. |
Rating :
|
Ebook :
Ebook_link_Shellcoders_Handbook |
|
|
|
This is one of the best book written on most complex and interesting
topics of computer security, 'Discovering and Exploiting Security
Holes'.
|
Read More |
|
|
Title : Rootkits, Subverting the Windows Kernel |
Author : Greg Hoguland, Jamie Butler |
Rating :
|
Ebook :
Ebook_link_Rootkits_Subverting_Windows_Kernel |
|
|
|
This is the incredible book ever written
on darkest area of computer security world. Authors have done splendid
job in presenting the most mysterious subject of computer security in
very simple and easy to understandable format.
|
Read More |
|
|
Title : The IDA Pro Book |
Author : Chris Eagle |
Rating :
|
|
|
|
There has been many books written on the IDA Pro. But this book
stands apart from all those. So far this is the most splendid book every
produced on world's most popular disassembler.
|
Read More |
|