In this section, I am posting all the books I have read or currently reading and I consider relevant for their content with this blog.


Network attacks and Exploitation: A Framework

How they rule the world: The 22 secret strategies of global power


Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents


Intelligence-Driven Incident Response

Cyber Deception: Building the Scientific Foundation



Incident Response & Computer Forensics 3rd edition

Security Intelligence: A practitioner’s guide to solving enterprise security challenges

Malware forensics field guide for Windows systems

Learn about firewall design, Juniper Networks by Judy Thompson-Melanson


Information Security Analytics: finding security insights, patterns and anomalies in big data 

Ten strategies of a World-Class Cybersecurity Operations Center by Carson Zimmerman


Python for Informatics: Exploring Information by Dr. Charles R. Severance

This is a very easy to read and understand Python book for beginners. After some time looking at resources to get my old programming skills up to date in Python I decided this would be a good start. I have a strong background in programming however I never enjoyed programming. Comparing this book with my studies in university I must say that this book will save much of the pain I had to go through to understand programming. Python is a very powerful and much simpler language than my old friends such as ADA 95, C and C++. This book provides you a good foundation in Python to move up and start programming. It is worth mentioning that this book also is in use in some of the courses offered in Coursera by the University of Michigan.

Android Malware and Analysis by Ken Dunham.

How to define and build an effective Cyber Threat Intelligence Capability by Henry Dalziel and Eric Olson.

Practical Packet Analysis: Using Wireshark to Solve Real – World Network Problems by Chris Sanders.


Network Forensics Tracking Hackers Through Cyberspace by Sherri Davidoff and Jonathan Ham.


The practice of Network Security Monitoring by Richard Bejtlich


The applied network security monitoring – collecction, detection and analysis by Chris Sanders and Jason Smith


3 Comments Add yours

  1. Brenden Richard says:

    Hello Samuel,
    Thank you for sharing your books. I really like Malware forensics field guide for Windows systems, so I was pleasantly surprised to see it referenced.
    Since you seem like an avid reader of Digital forensics book, my I share my absolute personal favorites:
    – The art of Memory Forensics: I as a bit disappointed not to see this one first in your list. It is absolutly amazing and covers a lot of technical ground :
    – Windows Sysinternals: talks about the internals of Windows and is an absolute must to understand rootkits and such.
    – Finally, my personal favorite: How to Investigate Like a Rockstar : the author describes a real incident response situation, and dives into the technical and human aspect of a crisis..very entertaining and highly technical!

    Cheers !


    1. Thanks very much Brenden, I read some of them too but I have not done the review.Thanks for sharing them.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s