BOOKS

Page

BOOKS ITSEC

Pentest Books

  • The Hacker Playbook 3: Practical Guide To Penetration Testing Paperback– May 2, 2018
    by Peter Kim (Author)
  • Hacking: The Art of Exploitation, 2nd Edition
    by Jon Erickson  (Author)
  • Rtfm: Red Team Field Manual Paperback – February 11, 2014
    by Ben Clark  (Author)
  • Hash Crack: Password Cracking Manual (v2.0) 2nd Edition
    by Joshua Picolet  (Author)
  • Penetration Testing: A Hands-On Introduction to Hacking 1st Edition
    by Georgia Weidman  (Author)

Metasploit

  • Metasploit: The Penetration Tester’s Guide 1st Edition
    by David Kennedy  (Author), Jim O’gorman (Author), Devon Kearns  (Author), Mati Aharoni (Author)
  • Mastering Metasploit – Second Edition 2nd Revised edition Edition
    by Nipun Jaswal 
  • Metasploit Bootcamp: The fastest way to learn Metasploit Paperback – May 25, 2017
    by Nipun Jaswa
  • Metasploit for Beginners: Create a threat-free environment with the best-in-class tool
    Paperback – July 21, 2017
    by Sagar Rahalkar (Author)
  • Mastering Metasploit: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
    3rd Edition 3rd Revised edition Edition
    by Nipun Jaswal  (Author)

Nmap

  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
    Paperback – January 1, 2009
    by Gordon Fyodor Lyon  (Author)
  • Nmap 6 Cookbook: The Fat Free Guide to Network Security Scanning
    Paperback – February 1, 2015
    by Nicholas Marsh  (Author)

BlueTEAM:

  • Defensive Security Handbook: Best Practices for Securing Infrastructure 1st Edition
    by Lee Brotherston  (Author), Amanda Berlin  (Author)
  • Blue Team Field Manual (BTFM) (RTFM)
    Paperback – January 13, 2017
    by Alan J White (Author), Ben Clark  (Contributor)
  • Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan 1st Edition
    by Jeff Bollinger  (Author), Brandon Enright (Author), Matthew Valites  (Author)
  • Defensive Security Handbook: Best Practices for Securing Infrastructure 1st Edition
    by Lee Brotherston  (Author), Amanda Berlin  (Author)

 

SIEM, Log Management, and Information Security Analytics

  • Network Security Through Data Analysis: Building Situational Awareness
    by Michael S. Collins
  • Security Information and Event Management (SIEM) Implementation (Network Pro Library) 
    by David R. Miller, Shon Harris, Alan Harper, Stephen VanDyke, and Chris Blask
  •  Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
    by Evan Wheeler
  • Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
    by Anton A. Chuvakin and Kevin J. Schmidt
  • Data-Driven Security: Analysis, Visualization and Dashboards
    by Jay Jacobs and Bob Rudis
  • Intelligence-Driven Incident Response: Outwitting the Adversary 1st Edition
    by Scott J. Roberts  (Author), Rebekah Brown (Author)
  • Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan 1st Edition
    by Jeff Bollinger  (Author), Brandon Enright (Author), Matthew Valites  (Author)

Wireshark

  • Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2
    2nd Edition
     Paperback – March 30, 2018
    by Nagendra Kumar Nainar (Author), Yogesh Ramdoss (Author), Yoram Orzach (Author)
  • Wireshark 101: Essential Skills for Network Analysis – Second Edition: Wireshark Solution Series 
    2nd ed. Edition
    by Laura Chappell (Author), Gerald Combs (Foreword)
  • Troubleshooting with Wireshark: Locate the Source of Performance Problems
    Paperback – January 19, 2014
    by Laura Chappell(Author), James Aragon(Editor), Gerald Combs(Foreword)
  • Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
    2nd Edition
    by Laura Chappell(Author), Gerald Combs(Foreword)
  • Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide 
    by Laura Chappell (Author), Gerald Combs (Foreword)

 

PYTHON

  • Learning Python, 5th Edition
    by Mark Lutz  (Author)
  • Python Pocket Reference: Python In Your Pocket (Pocket Reference (O’Reilly)) Fifth Edition
    by Mark Lutz(Author)
  • Python Crash Course: A Hands-On, Project-Based Introduction to Programming 1st Edition
    by Eric Matthes(Author)
  • Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython 2nd Edition
    by Wes McKinney(Author)
  • Mastering Python Networking: Your one stop solution to using Python for network automation, DevOps, and SDN
    Paperback – June 28, 2017
  • Python Penetration Testing Cookbook: Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
    Paperback – November 28, 2017
    by Rejah Rehim  (Author)
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers 1st Edition
    by TJ O’Connor(Author)
  • Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition
    by Justin Seitz  (Author)

Malware Analysis

  • Malware Analyst′s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code / ISBN-13: 978-0470613030