Recommended Reading

Mon
06
Feb

Hacked Again

Written by Scott N. Schober

Hacked Again is a book about an introduction to information security and key terms or phrases used in the industry. Each chapter covers a different aspect of Information Security which includes a definition and a few examples to clarify. Scott, the author, clearly has a lot of experience in the industry and relays that throughout the book. His examples are clear, and to the point. Each chapter is relatively short, and to the point as well. You will never find yourself looking to see how many pages are left.

Pros: Excellent introduction to information security for beginners. It covers many of the popular items like phishing, proper passwords, and website security. This is a great resource for a small business owner to get up to speed on some current concerns, as well as offers advice on specific topics

Wed
21
Oct

r00ting the hacker: An Interview with Dan Verton

Contributed by Tarek

"...With every technology there are unintended consequences. And in the case of computer technology, the unintended
consequence was that inherently bad people could use the new technology to do bad things."
- Dan Verton, author of The Hacker Diaries

This document is in PDF format. To view it click here.

Fri
09
Oct

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses

Written by Ed Skoudis Ed Skoudis is a recognized expert in host and network security. This is an update to Ed's previous book, Counter Hack. This time, he has enlisted the help of Tom Liston, known for his tarpit work ([...] For those unfamiliar with the Counter Hack book, it includes details and examples on everything a security professional should know. This includes ports and protocols, UNIX need to knows, Windows need to knows, Reconnaissance, application attacks, Operating System attacks, Network attacks, Denial of Service attacks, Trojans, Backdoors, Rootkits, altering logs, covert channels, and examples of real world attacks. For those who have not taken the Advanced hacking course at SANS, this book is the closest you will come to experiencing Ed's expertise without taking the course. Ed gives relevant, detailed examples with diagrams and charts, explains how attacks occur, what to look for, and how to defend against them.

Fri
09
Oct

Malware: Fighting Malicious Code

Written by Ed Skoudis

Once again, Ed has captured the essence of exactly what makes him one of the greatest educators I have ever had the privilege to meet. In his most recent book, Malware, he discusses a topic that has been in the headlines for the last year or so. Starting with SQL Slammer worm, and adding the flurry of worms and viruses that soon followed, Malware raised everyone's eyebrows at the new threats that haunt us today.

The book begins with a chapter defining Malware. It covers Trojans, Backdoors, Viruses, Worms and Malicious Applets. Ed and Lenny give a history lesson on each of these nasties to demonstrate that many of these Malware started out quit innocently. He digs deeper into the world of malicious software and touches on Rootkits. Ed does an excellent job of discussing both Windows level attacks and UNIX type attacks.

Fri
09
Oct

The Little Black Book of Computer Security

Written by Joel Dubin

This book is a very different approach to Information Security. I have to say, I think this style is long over do. The style that Joel uses is a checklist format to most security issues facing companies today. The book starts off with an introduction to Information Security, including many definitions and terms. This is the only place I really have any issues with the book. Some of the definitions are not in line with the Information Security community's definition. Without going into too much detail, I highly recommend that anyone who reads this book, please take the definitions lightly. Focus more on the actual content of the book.

Pages

Subscribe to RSS - Recommended Reading