Cyber Security Expo
Application, Coding & Malware
Communication Security
Host Security
Network Security
Non-technical & Misc.

ISW has developed a special relationship with many of today's top book publishers in the IT/Security industry from which we receive new books and manuscripts monthly.

Though many of these donated books are promoted through the monthly writing contest, we should emphasize that for this section we review but do not post every title sent to us.

As implied, it is strictly "Recommended Reading", meaning you will find here only books we think are definitive, original and of value to our readers.

Featured Book:
Crimeware - Understanding New Attacks and Defenses by Markus Jakobsson & Zulfikar Ramzan

There is a new breed of online predators - serious criminals intent on stealing big bucks and top-secret information - and their weapons of choice are a dangerous array of tools called

Latest Reviews:
23-05-2007:Stealing the Network: How to Own an Indentity by Raven Adler, Jay Beale, Riley “Caez reviewed by Charles Hornat ()
08-05-2006:How to Break Web Software by Mike Andrews and James A. Whittaker reviewed by Charles Hornat ()
25-01-2006:Counter Hack Reloaded by Ed Skoudis reviewed by Charles Hornat ()
20-11-2005:Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich reviewed by Charles Hornat ()
11-11-2005:Cryptography in the Database by Kevin Kenan reviewed by Charles Hornat ()
Most Popular Books:
Crimeware - Understanding New Attacks and Defenses by Markus Jakobsson & Zulfikar Ramzan
Astalavista Security Toolbox DVD v1.0 by Astalavista
The Hack Counter-Hack Training Course by Ed Skoudis
Information Trickery: The Great IT Upgrade Scam by Brian Hitchen and Mike Lee
Exploiting Software: How to Break Code by Greg Hoglund

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.