Books

In this section I am posting all the books I have read or currently reading and I consider relevant for their content with this blog.

/*2018*/

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents

/*2017*/

Intelligence-Driven Incident Response

Cyber Deception: Building the Scientific Foundation

 

/*2016*/

Incident Response & Computer Forensics 3rd edition

Security Intelligence: A practitioner’s guide to solving enterprise security challenges

Malware forensics field guide for Windows systems

Learn about firewall design, Juniper Networks by Judy Thompson-Melanson

/*2015*/

Information Security Analytics: finding security insights, patterns and anomalies in big data 

Ten strategies of a World-Class Cybersecurity Operations Center by Carson Zimmerman

 

Python for Informatics: Exploring Information by Dr. Charles R. Severance

This is a very easy to read and understand Python book for beginners. After some time looking at resources to get my old programming skills up to date in Python I decided this would be a good start. I have a strong background in programming however I never enjoyed programming. Comparing this book with my studies in university I must say that this book will save much of the pain I had to go through to understand programming. Python is a very powerful and much simpler language than my old friends such as ADA 95, C and C++. This book provides you a good foundation in Python to move up and start programming. It is worth mentioning that this book also is in use in some of the courses offered in Coursera by the University of Michigan.

http://www.amazon.com/Python-Informatics-Dr-Charles-Severance/dp/1492339245

Android Malware and Analysis by Ken Dunham.

How to define and build an effective Cyber Threat Intelligence Capability by Henry Dalziel and Eric Olson.

Practical Packet Analysis: Using Wireshark to Solve Real – World Network Problems by Chris Sanders.

 

Network Forensics Tracking Hackers Through Cyberspace by Sherri Davidoff and Jonathan Ham.

 

The practice of Network Security Monitoring by Richard Bejtlich

 

The applied network security monitoring – collecction, detection and analysis by Chris Sanders and Jason Smith

 

Advertisements

3 Comments Add yours

  1. Brenden Richard says:

    Hello Samuel,
    Thank you for sharing your books. I really like Malware forensics field guide for Windows systems, so I was pleasantly surprised to see it referenced.
    Since you seem like an avid reader of Digital forensics book, my I share my absolute personal favorites:
    – The art of Memory Forensics: I as a bit disappointed not to see this one first in your list. It is absolutly amazing and covers a lot of technical ground : http://www.amazon.com/dp/B00JUUZSQC
    – Windows Sysinternals: talks about the internals of Windows and is an absolute must to understand rootkits and such.
    – Finally, my personal favorite: How to Investigate Like a Rockstar : the author describes a real incident response situation, and dives into the technical and human aspect of a crisis..very entertaining and highly technical! https://books2read.com/u/4jDWoZ

    Cheers !

    Like

    1. Thanks very much Brenden, I read some of them too but I have not done the review.Thanks for sharing them.

      Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s