All times are UTC [ DST ]




Post new topic Reply to topic  [ 1 post ] 
  Print view

SANS-The Best Security Books to have in your library
Author Message
PostPosted: Sat Mar 19, 2016 11:07 am 
Offline

Joined: Wed Dec 26, 2012 1:00 am
Posts: 3093
[center]Image
SANS-The Best Security Books to have in your library
Size: 734.83 MB Type: e-Books

[/center]

[center]
The Best Security Books to have in your library

GIAC Advisory Board
What are the best security books to have in your library? To find out, we polled the GIAC Advisory Board. Students that score over 90 on their GIAC certification exams are invited to join the Advisory Board. Their answers are shown below. The ones in bold received multiple votes.
SECURITY BOOKS
The Art of War for Security Managers - Scott A. Watson
Beyond Fear - Bruce Schneier
Botnets: The Killer Web App - Schiller, Binkly et al
Counter Hack Reloaded: A Step-by Step Guide to Computer Attacks and Effective Defenses (2nd Edition) - Edward Skoudis and Tom Liston
Extrusion Detection - Richard Bejtlich
Google Hacking for Penetration Testers, Vol. 1 - Long, Skoudis, Eijkelenborg
Gray Hat Hacking: The Ethical Hacker's Handbook - Harris, Harper, Eagle, Ness, Lester

Hacker's Challenge I, II, III Series - Schiffman, Pennington, Pollio, O'Donnell

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks - Susan Young and Dave Aitel
Hacking Exposed-VOIP - David Endler and Mark Collier
Hacking: The Art of Exploitation - Jon Erickson
Inside Network Perimeter Security - Stephen Northcutt and Judy Novak
Internet Forensics - Robert Jones
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research - James Foster
The Oracle Hacker's Handbook: Hacking and Defending Oracle - David Litchfield
Network Intrusion Detection, 3rd Edition - Stephen Northcutt and Judy Novak
Professional Pen Testing for Web Applications - Andres Andre
RailsSpace: Building a Social Networking Website with Ruby on Rails - Michael Hartl and Aurelius Prochazka
Real Digital Forensics: Computer Security and Incident Response - Jones, Bejtlich, Rose
Reversing: Secrets of Reverse Engineering - Eldad Eilam
Secrets and Lies - Bruce Schneier
Security Data Visualization Graphical Techniques for Network Analysis - Greg Conti
Security Metrics: Replacing Fear, Uncertainty, and Doubt - Andrew Jacquith
Security Warrior - Anton Chuvakin
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures - Peter Thermos and Ari Takanen
The Shellcoder's Handbook, 2nd Edition - Chris Anley
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks - Michal Zalewski
The Tao of Network Security Monitoring: Beyond Intrusion Detection - Richard Bejtlich
The TCP/IP Guide - Charles M. Kozierok (No Starch Press)
The Web Application Hacker's Handbook - Dafydd Stuttard and Marcus Pinto
Wi-Foo: The Secrets of Wireless Hacking (and Wi-Foo, 2nd edition) - Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky
802.11 Wireless Networks: The Definitive Guide (Second Edition) - Matthew S. Gast. ISBN 0-596-10052-3
-:DOWNLOAD FROM LINKS:-
NitroFlare
Code:
http://nitroflare.com/view/EE6D21FC193FCB8/TheBestSecurityBooks_to_have_in_your_library.rar


RapidGator
Code:
http://rapidgator.net/file/76b9aa0bf4df3a0b77f46c3b8e74ba67/TheBestSecurityBooks_to_have_in_your_library.rar.html


UpLoaded
Code:
http://uploaded.net/file/8d1t5i3c/TheBestSecurityBooks_to_have_in_your_library.rar


Don't forget to say Thanks !!!
[/center]


Top
 Profile  
 

Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

All times are UTC [ DST ]

 


Related Topics

Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron