In this section, I am posting all the books I have read or currently reading and I consider relevant for their content with this blog.


Book Review: Managing Cyber Risk

Book Review: Industrial Network Security

Leading change, our iceberg is melting by John Kotter



Network attacks and Exploitation: A Framework

How they rule the world: The 22 secret strategies of global power



Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents



Intelligence-Driven Incident Response

Cyber Deception: Building the Scientific Foundation



Incident Response & Computer Forensics 3rd edition

Security Intelligence: A practitioner’s guide to solving enterprise security challenges

Malware forensics field guide for Windows systems

Learn about firewall design, Juniper Networks by Judy Thompson-Melanson


Information Security Analytics: finding security insights, patterns and anomalies in big data 

Ten strategies of a World-Class Cybersecurity Operations Center by Carson Zimmerman

Python for Informatics: Exploring Information by Dr. Charles R. Severance

Android Malware and Analysis by Ken Dunham.

How to define and build an effective Cyber Threat Intelligence Capability by Henry Dalziel and Eric Olson.

Practical Packet Analysis: Using Wireshark to Solve Real – World Network Problems by Chris Sanders.

Network Forensics Tracking Hackers Through Cyberspace by Sherri Davidoff and Jonathan Ham.

The practice of Network Security Monitoring by Richard Bejtlich

The applied network security monitoring – collecction, detection and analysis by Chris Sanders and Jason Smith


3 Comments Add yours

  1. Brenden Richard says:

    Hello Samuel,
    Thank you for sharing your books. I really like Malware forensics field guide for Windows systems, so I was pleasantly surprised to see it referenced.
    Since you seem like an avid reader of Digital forensics book, my I share my absolute personal favorites:
    – The art of Memory Forensics: I as a bit disappointed not to see this one first in your list. It is absolutly amazing and covers a lot of technical ground :
    – Windows Sysinternals: talks about the internals of Windows and is an absolute must to understand rootkits and such.
    – Finally, my personal favorite: How to Investigate Like a Rockstar : the author describes a real incident response situation, and dives into the technical and human aspect of a crisis..very entertaining and highly technical!

    Cheers !


    1. Thanks very much Brenden, I read some of them too but I have not done the review.Thanks for sharing them.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s