Automotive Deals Best Books of the Month Amazon Fashion Learn more nav_sap_plcc_ascpsc $5 Albums Fire TV Stick Subscribe & Save Handmade school supplies Shop-by-Room Amazon Cash Back Offer harmonquest_s1 harmonquest_s1 harmonquest_s1  Amazon Echo  Echo Dot  Amazon Tap  Echo Dot  Amazon Tap  Amazon Echo Introducing new colors All-New Kindle Oasis Enter for the chance to win front row seats to Barbra Streisand Segway miniPro

IT Security Analyst Bookshelf

william britton freeman
The list author says: "These books were very useful during my Infosec Career."
The Tao of Network Security Monitoring: Beyond Intrusion Detection
The Tao of Network Security Monitoring: Beyond Intrusion Detection
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Extrusion Detection: Security Monitoring for Internal Intrusions
Extrusion Detection: Security Monitoring for Internal Intrusions
Real Digital Forensics: Computer Security and Incident Response
Real Digital Forensics: Computer Security and Incident Response
File System Forensic Analysis
File System Forensic Analysis
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Network Warrior
Network Warrior
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Network Flow Analysis
Network Flow Analysis
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
UNIX and Linux System Administration Handbook (4th Edition)
UNIX and Linux System Administration Handbook (4th Edition)
Security Metrics
Security Metrics
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Security Data Visualization: Graphical Techniques for Network Analysis
Security Data Visualization: Graphical Techniques for Network Analysis
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Junos Security
Junos Security
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Classic Shell Scripting
Classic Shell Scripting
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Network+ Guide to Networks (Network Design Team)
Network+ Guide to Networks (Network Design Team)
The Practice of System and Network Administration, Second Edition
The Practice of System and Network Administration, Second Edition
DRAGON BYTES.CHINESE INFORMATION-WAR THEORY AND PRACTICE
DRAGON BYTES.CHINESE INFORMATION-WAR THEORY AND PRACTICE
Decoding The Virtual Dragon - Critical Evolutions In The Science And Philosophy Of China's Information Operations And Military Strategy - The Art Of War And IW by Timothy L. Thomas
Decoding The Virtual Dragon - Critical Evolutions In The Science And Philosophy Of China's Information Operations And Military Strategy - The Art Of War And IW by Timothy L. Thomas
The Dragon's Quantum Leap: Transforming from a Mechanized to an Informatized Force
The Dragon's Quantum Leap: Transforming from a Mechanized to an Informatized Force
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Windows Internals, Part 1 (6th Edition) (Developer Reference)
Windows Internals, Part 1 (6th Edition) (Developer Reference)
Windows Internals, Part 2 (6th Edition) (Developer Reference)
Windows Internals, Part 2 (6th Edition) (Developer Reference)