More information about me
My infosec portal
Infosec book reviews
- (09/04/2001)
"Information
Warfare: How to Survive Cyber Attacks" by Michael Erschloe [published
at SecurityWatch]
- (08/24/2001)
"Hacking
Linux Exposed" by Brian Hatch, James Lee and George Kurtz [published
at SecurityWatch]
- (08/2001)
"Incident
Response" by Kenneth R. van Wyk and Richard Forno [published
at SecurityWatch]
- (01/09/2002)
"Incident Response: Investigating Computer Crime" by Kevin Mandia, Chris Prosise
[published at SC Magazine web portal]
- (03/13/2002)
"Hacker's Challenge" by Mike Schiffman
[published at SC Magazine web portal]
- (06/04/2002)
"CERT Guide to System and Network Security" by Julia Allen
[published at SC Magazine web portal]
- (05/01/2002)
"Know
You Enemy" by Project Honeynet [posted at Amazon.com]
- (07/10/2002)
"Authentication: From Passwords to Public Keys" by Richard E. Smith [published at SC Magazine web portal]
- (08/02/2002)
"Honeypots: Tracking Hackers" by Lance Spitzner [published at SlashDot web portal]
(also
posted
on the
Amazon.com)
- (09/11/2002)
"Web Hacking: Attacks and Defense" by Stuart McClure, Saumil Shah, Shreeraj Shah [posted at Amazon.com]
- (09/11/2002)
"Building Linux and OpenBSD Firewalls" by Wes Sonnenreich, Tom Yates [posted at Amazon.com]
- (09/30/2002)
"Anti-Hacker Tool Kit" by Mike Shema, Bradley C. Johnson, Keith J. Jones [posted at Amazon.com]
- (09/30/2002)
"Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems" by Stephen Northcutt, Karen Fredrick, Scott Winters, Lenny Zeltser, Ronald W Ritchey [posted at Amazon.com]
- (10/09/2002)
"Incident Response" by Eugene Schultz and Russell Shumway [published in ;login USENIX magazine]
- (10/30/2002)
"Network Intrusion Detection, 3rd edition" by Stephen Northcutt and Judy Novak [published at SC Magazine web portal]
- (11/04/2002)
"The Art of Deception: Controlling the Human Element of Security" by Kevin D. Mitnick, William L. Simon [posted at Amazon.com]
- (11/04/2002)
"Network Intrusion Detection: An Analyst's Handbook (3nd Edition)" by Stephen Northcutt, Judy Novak [posted at Amazon.com]
- (11/25/2002)
"Wireless Security and Privacy: Best Practices and Design Techniques"by Tara M. Swaminatha, Charles R. Elden [posted at Amazon.com]
- (01/02/2003)
"A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness" by Fred Chris Smith, Rebecca Gurley Bace [posted at Amazon.com]
- (01/17/2003)
"Hacker's Challenge 2: Test Your Network Security & Forensic Skills" by Mike Schiffman, Bill Pennington, David Pollino, Adam O*Donnell [posted at Amazon.com]
- (01/28/2003)
"Building Open Source Network Security Tools: Components and Techniques" by Mike Schiffman [posted at Amazon.com]
- (04/17/2003)
"IT Security: Risking the Corporation" by Linda McCarthy [posted at Amazon.com]
- (04/17/2003)
"FreeBSD: The Complete Reference" by Roderick W. Smith [posted at Amazon.com]
- (04/22/2003)
"Securing Linux: A Survival Guide for Linux Security" by SANS Institute [posted at SANS web site]
- (05/05/2003)
"Securing Cisco Routers: Step-by-Step" by Joshua L. Wright, John N. Stewart (SANS) [posted at Amazon.com]
- (05/13/2003)
"Mission-Critical Security Planner: When Hackers Won't Take No for an Answer" by Eric Greenberg [posted at Amazon.com]
- (05/13/2003)
"Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses" by Ed Skoudis [posted at Amazon.com]
- (06/19/2003)
"Firewalls and Internet Security: Repelling the Wily Hacker" by William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin [posted at Amazon.com]
- (07/17/2003)
"Hacking Exposed" by by Stuart McClure, Joel Scambray, George Kurtz [posted at Amazon.com]
- (08/19/2003)
"Access Denied: The Complete Guide to Protecting Your Business Online" by Cathy Cronkhite, Jack McCullough [posted at Amazon.com]
- (08/19/2003)
"Inside the Security Mind: Making the Tough Decisions" by Kevin Day [posted at Amazon.com]
- (09/24/2003)
"Computer Security: 20 Things Every Employee Should Know" by Ben Rothke [posted at Amazon.com]
- (09/24/2003)
"Black Ice: The Invisible Threat of Cyberterrorism" by Dan Verton [posted at Amazon.com]
- (10/01/2003)
"HackNotes(tm) Network Security Portable Reference" Michael Horton, Clinton Mugge [posted at Amazon.com]
- (11/06/2003)
"Incident Response and Computer Forensics, Second Edition" by Chris Prosise, Kevin Mandia, Matt Pepe [posted at Amazon.com]
- (11/06/2003)
"HackNotes(tm) Web Security Pocket Reference" by Mike Shema [posted at Amazon.com]
- (11/20/2003)
"Managing A Network Vulnerability Assessment" by Justin Peltier, John A. Blackley, Thomas R. Peltier [posted at Amazon.com]
- (12/10/2003)
"Investigative Data Mining for Security and Criminal Detection" by Jesus Mena [posted at Amazon.com]
- (12/10/2003)
"How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN" by Lee Barken [posted at Amazon.com]
- (02/04/2004)
"Intrusion Detection and Prevention" by Eugene Schultz, Jim Mellander, Carl F. Endorf [posted at Amazon.com]
- (02/04/2004)
"The Effective Incident Response Team" by Julie Lucas, Brian Moeller [posted at Amazon.com]
- (03/08/2004)
"The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks" by Susan Young, Dave Aitel [posted at Amazon.com]
- (05/12/2004)
"Anti-Hacker Tool Kit, Second Edition" by by Mike Shema, Bradley C. Johnson [posted at Amazon.com]
- (05/12/2004)
"Computer Security for the Home and Small Office" by Thomas C. Greene [posted at Amazon.com]
- (05/12/2004)
"Defense and Detection Strategies against Internet Worms" by Jose Nazario [posted at Amazon.com]
- (05/12/2004)
"Exploiting Software : How to Break Code" by Greg Hoglund and Gary McGraw [posted at Amazon.com]
- (06/30/2004)
"Network Security Hacks" by Andrew Lockhart [posted at Amazon.com]
- (06/30/2004)
"Defend I.T. : Security by Example" by Ajay Gupta, Scott Laliberte
[posted at Amazon.com]
- (10/14/2004)
"Network Security Hacks"by Andrew Lockhart
[posted at Amazon.com]
- (10/14/2004)
"Assessing Network Security" by Ben Smith, David LeBlanc, Kevin Lam
[posted at Amazon.com]
- (10/14/2004)
"The Tao of Network Security Monitoring : Beyond Intrusion Detection" by Richard Bejtlich
[posted at Amazon.com]
- (10/14/2004)
"Network Security Assessment" by Chris McNab
[posted at Amazon.com]
- (10/14/2004)
"Wi-Foo : The Secrets of Wireless Hacking" by Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky
[posted at Amazon.com]
All my
Amazon reviews.
To contact me with questions or comments, use email.
For other contact methods, look at the home
page.
For my information security book list go here.
For my infosec portal go here
here.
Last updated Oct 14 2004