Books

In this section I am posting all the books I have read or currently reading and I consider relevant for their content with this blog.

/*2017*/

Intelligence-Driven Incident Response

Cyber Deception: Building the Scientific Foundation

 

/*2016*/

Incident Response & Computer Forensics 3rd edition

Security Intelligence: A practitioner’s guide to solving enterprise security challenges

Malware forensics field guide for Windows systems

Learn about firewall design, Juniper Networks by Judy Thompson-Melanson

/*2015*/

Information Security Analytics: finding security insights, patterns and anomalies in big data 

Ten strategies of a World-Class Cybersecurity Operations Center by Carson Zimmerman

 

Python for Informatics: Exploring Information by Dr. Charles R. Severance

This is a very easy to read and understand Python book for beginners. After some time looking at resources to get my old programming skills up to date in Python I decided this would be a good start. I have a strong background in programming however I never enjoyed programming. Comparing this book with my studies in university I must say that this book will save much of the pain I had to go through to understand programming. Python is a very powerful and much simpler language than my old friends such as ADA 95, C and C++. This book provides you a good foundation in Python to move up and start programming. It is worth mentioning that this book also is in use in some of the courses offered in Coursera by the University of Michigan.

http://www.amazon.com/Python-Informatics-Dr-Charles-Severance/dp/1492339245

Android Malware and Analysis by Ken Dunham.

How to define and build an effective Cyber Threat Intelligence Capability by Henry Dalziel and Eric Olson.

Practical Packet Analysis: Using Wireshark to Solve Real – World Network Problems by Chris Sanders.

 

Network Forensics Tracking Hackers Through Cyberspace by Sherri Davidoff and Jonathan Ham.

 

The practice of Network Security Monitoring by Richard Bejtlich

 

The applied network security monitoring – collecction, detection and analysis by Chris Sanders and Jason Smith

 

Advertisements

One Comment Add yours

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s