Visit my infosecurity information portal http://www.info-secure.org
After you bought my book, go and see a new complete list of my security book reviews below:
(09/04/2001) "Information Warfare: How to Survive Cyber Attacks" by Michael Erschloe [published at SecurityWatch] | |
(08/24/2001) "Hacking Linux Exposed" by Brian Hatch, James Lee and George Kurtz [published at SecurityWatch] | |
(08/2001) "Incident Response" by Kenneth R. van Wyk and Richard Forno [published at SecurityWatch] | |
(01/09/2002) "Incident Response: Investigating Computer Crime" by Kevin Mandia, Chris Prosise [published at SC Magazine web portal] | |
(03/13/2002) "Hacker's Challenge" by Mike Schiffman [published at SC Magazine web portal] | |
(06/04/2002) "CERT Guide to System and Network Security" by Julia Allen [published at SC Magazine web portal] | |
(05/01/2002) "Know You Enemy" by Project Honeynet [posted at Amazon.com] | |
(07/10/2002) "Authentication: From Passwords to Public Keys" by Richard E. Smith [published at SC Magazine web portal] | |
(08/02/2002) "Honeypots: Tracking Hackers" by Lance Spitzner [published at SlashDot web portal] (also posted on the Amazon.com) | |
(09/11/2002) "Web Hacking: Attacks and Defense" by Stuart McClure, Saumil Shah, Shreeraj Shah [posted at Amazon.com] | |
(09/11/2002) "Building Linux and OpenBSD Firewalls" by Wes Sonnenreich, Tom Yates [posted at Amazon.com] | |
(09/30/2002) "Anti-Hacker Tool Kit" by Mike Shema, Bradley C. Johnson, Keith J. Jones [posted at Amazon.com] | |
(09/30/2002) "Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems" by Stephen Northcutt, Karen Fredrick, Scott Winters, Lenny Zeltser, Ronald W Ritchey [posted at Amazon.com] | |
(10/09/2002) "Incident Response" by Eugene Schultz and Russell Shumway [published in ;login USENIX magazine] | |
(10/30/2002) "Network Intrusion Detection, 3rd edition" by Stephen Northcutt and Judy Novak [published at SC Magazine web portal] | |
(11/04/2002) "The Art of Deception: Controlling the Human Element of Security" by Kevin D. Mitnick, William L. Simon [posted at Amazon.com] | |
(11/04/2002) "Network Intrusion Detection: An Analyst's Handbook (3nd Edition)" by Stephen Northcutt, Judy Novak [posted at Amazon.com] | |
(11/25/2002) "Wireless Security and Privacy: Best Practices and Design Techniques"by Tara M. Swaminatha, Charles R. Elden [posted at Amazon.com] | |
(01/02/2003) "A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness" by Fred Chris Smith, Rebecca Gurley Bace [posted at Amazon.com] | |
(01/17/2003) "Hacker's Challenge 2: Test Your Network Security & Forensic Skills" by Mike Schiffman, Bill Pennington, David Pollino, Adam O*Donnell [posted at Amazon.com] | |
(01/28/2003) "Building Open Source Network Security Tools: Components and Techniques" by Mike Schiffman [posted at Amazon.com] | |
(04/17/2003) "IT Security: Risking the Corporation" by Linda McCarthy [posted at Amazon.com] | |
(04/17/2003) "FreeBSD: The Complete Reference" by Roderick W. Smith [posted at Amazon.com] | |
(04/22/2003) "Securing Linux: A Survival Guide for Linux Security" by SANS Institute [posted at SANS web site] | |
(05/05/2003) "Securing Cisco Routers: Step-by-Step" by Joshua L. Wright, John N. Stewart (SANS) [posted at Amazon.com] | |
(05/13/2003) "Mission-Critical Security Planner: When Hackers Won't Take No for an Answer" by Eric Greenberg [posted at Amazon.com] | |
(05/13/2003) "Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses" by Ed Skoudis [posted at Amazon.com] | |
(06/19/2003) "Firewalls and Internet Security: Repelling the Wily Hacker" by William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin [posted at Amazon.com] | |
(07/17/2003) "Hacking Exposed" by by Stuart McClure, Joel Scambray, George Kurtz [posted at Amazon.com] | |
(08/19/2003) "Access Denied: The Complete Guide to Protecting Your Business Online" by Cathy Cronkhite, Jack McCullough [posted at Amazon.com] | |
(08/19/2003) "Inside the Security Mind: Making the Tough Decisions" by Kevin Day [posted at Amazon.com] | |
(09/24/2003) "Computer Security: 20 Things Every Employee Should Know" by Ben Rothke [posted at Amazon.com] | |
(09/24/2003) "Black Ice: The Invisible Threat of Cyberterrorism" by Dan Verton [posted at Amazon.com] | |
(10/01/2003) "HackNotes(tm) Network Security Portable Reference" Michael Horton, Clinton Mugge [posted at Amazon.com] | |
(11/06/2003) "Incident Response and Computer Forensics, Second Edition" by Chris Prosise, Kevin Mandia, Matt Pepe [posted at Amazon.com] | |
(11/06/2003) "HackNotes(tm) Web Security Pocket Reference" by Mike Shema [posted at Amazon.com] | |
(11/20/2003) "Managing A Network Vulnerability Assessment" by Justin Peltier, John A. Blackley, Thomas R. Peltier [posted at Amazon.com] | |
(12/10/2003) "Investigative Data Mining for Security and Criminal Detection" by Jesus Mena [posted at Amazon.com] | |
(12/10/2003) "How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN" by Lee Barken [posted at Amazon.com] | |
(02/04/2004) "Intrusion Detection and Prevention" by Eugene Schultz, Jim Mellander, Carl F. Endorf [posted at Amazon.com] | |
(02/04/2004) "The Effective Incident Response Team" by Julie Lucas, Brian Moeller [posted at Amazon.com] | |
Below I provide a list of network security/cryptography/network architecture books I read or plan to read together with a short "review" (that is better be called an opinion, as it is as biased as they go).
This is supposedly of interest to my future employer and to whoever else interested (if not in my opinions, but in the list of the books all in one place). When I was looking for security books to read something of this sort would have been very helpful, but I was unable to find it.
So, now as soon as a new book surfaces in any of the BugTRAQ lists, firewal-wizards, fwtk-users, ids-list, linux-security, NTSECURITY.NET lists, WNT Mag Security UPDATE, R.I.S.K.S. digest and some others I will read it (if I have time and money, that is) and post the "review" here. Otherwise, I will just post the title and author and online availability.
Also, if you have some reviews for other books, better reviews for the books mentioned or at least pointers to review pages - do send them via email. I am reluctant to just take some review I see in the mailing list and post it on this page as I am unsure about copyright issues.
To judge whether I am any sort of authority on the subject refer to my infosec portal http://www.info-secure.org (yes, I am looking to be hired now!).
Also, I would stay away from "reviewing" the Classics, like this book. Some people much more worthy than me did that already.
My dream is to become the most complete collection of InfoSec book references, so that people entering the field would be able to find what they want quickly. Right now the list is really F-A-R from complete. Also I plan to list the target audience for each book in the future.
UPDATE! I decided to add links to some online-only resources on security. As there are too many of those, only links to resources that rival books in size, content organization and purpose will be posted. They are organized as a separate online section.
Here go the books in no particular order (while there are not many of them this is probably tolerable).
Jump to
1
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
105
110
115
120
125
130
135
140
145
150
155
160
170
180
190
200
Online books 1 5
Last modified: Tue Dec 06 22:50:55 Eastern Standard Time 2005