Hitchiker's World

Network Security books:

Network Security /
Network Security / Incident Response

Counter Hack Reloaded by Ed Skoudis
Just like Counter Hack, Ed's first book, Counter Hack Reloaded aims to provide its readers with enough knowledge to protect their systems and networks against attacks. Ed deomnstrates and explains some of the more common sorts of attacks that can be carried out by advanced and relatively unskilled 'script kiddies'.
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis
In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled 'script kiddies'.(from Amazon.com)
Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich
This book should be called The Engineers Guide to Implementing Security to Detect and Prevent Malicious Traffic in your network. This is a very thorough book on detecting malicious traffic leaving a network (hence Extrusion), with great illustrations and walkthroughs. There are chapters on planning, deployment, tuning and other key, often overlooked, aspects surrounding the wonderful world of Intrusion Detection.
HackNotes: Network Security Portable Reference by Mike Horton, Clinton Mugge
HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks and systems. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and code-level techniques. Learn information security and risk assessment principals. Guard against the most common network threats and vulnerabilities and understand hacker tactics and methods seen on the Internet and intranet. Conduct best practice security checks and hardening steps for your systems and environments. Learn about wireless security, web application security, social engineering, secure coding, and incident response. Use the unique Reference Center in the middle of the book to access key information, including default passwords, common port numbers, system and security commands, reference links, the top security assessment and hacker tools, and more!
Honeypots: Tracking Hackers by Lance Spitzner
Spitzner defines the various types of 'honeypots' that are used to emulate security breeches on computer networks, allowing system administrators to collect and analyze information on hackers who step into the trap. Spitzner, a senior security architect for Sun Microsystems, examines methods for honeypot deployment and addresses legal concerns about the rapidly growing technology that takes the offensive against computer crime. The included CD-ROM contains source code, data captures from actual attacks, and white papers.(from Book News, Inc.®, Portland, OR)
How to Break Web Software by Mike Andrews and James A. Whittaker
It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software. In this book, two renowned experts address every category of Web software exploit: attacks on clients, servers, state, user inputs, and more. You’ll master powerful attack tools and techniques as you uncover dozens of crucial, widely exploited flaws in Web architecture and coding. The authors reveal where to look for potential threats and attack vectors, how to rigorously test for each of them, and how to mitigate the problems you find. Coverage includes
Incident Response and Computer Forensics, Second Edition by Chris Prosise, Kevin Mandia, Matt P
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today's hack attacks.
Incident Response: Computer Forensics Toolkit by Douglas Schweitzer
Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer arms you with the tools to reveal a security breach, gather evidence to report the crime, and conduct audits to prevent future attacks.
Inside Network Perimeter Security by Stephen Northcutt, et al
Has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security.
The Hack Counter-Hack Training Course by Ed Skoudis
Watch, listen, learn-as leading Network security expert Ed Skoudis walks you through today's most dangerous attacks, and demonstrates your best countermeasures!
Covers the five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection.
Over 4 hours of expert digital video instruction, detailed explanations, and hands-on exercises-a complete learning experience.(from Amazon.com)

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.