Whether you want to know how hackers think and work so you can defend against them better, or you need to create a solid disaster recovery plan or you just want to make sure your network is secure- these books can give you the information you need. While the Internet is a valuable resource, sometimes it helps to have a book right there on your desk that you can refer to when you need it.
Hacking Exposed has more or less established this entire genre of books. Now in its fifth edition, and having sold millions of copies throughout the world, the book is the number one best-selling computer security book and it is still just as useful and valuable as it ever was.
This book has been a must-read for anyone tasked with network security from its original publishing. This 3rd Edition is extensively revised to bring it up to speed with current tips and techniques. Ihighly recommend this book as a staple for anyone interested in or tasked with performing information security.
Ed Skoudis has written a comprehensive and definitive work on malicious code. This book provides detailed coverage of malicious code- what it is, how it works and how you can defend against it. The book provides great information for beginners to gain a better understanding, and provides in-depth information for the more advanced users. Malicious code is quite prevalent and a book like this is an excellent resource to learn more about it and what you can do to keep from becoming a victim.
Incident Response by Douglas Schweitzer is an excellent source of information with everything you need to know to prepare for and respond to a computer security incident.
Steal This Computer Book 3 by Wallace Wang offers a comprehensive, humorous and insightful look at personal computer security and some of the tools and techniques used by hackers. Everyone should read this book.
I always thought of computer security as a necessary but boring subject but the authors of this book have managed to make it both informative and entertaining. If you are a security specialist looking to take the "hacker's Challenge" and test how much you know or if you are just someone wanting to learn more about some of the latest security threats then this book will provide you with many hours of interesting reading and investigating.
Rootkits are not new, but they have emerged recently as one of the hot new attacks, particularly against computers running one of the Microsoft Windows operating systems. Hoglund and Butler have written a somewhat seminal book on the subject and definitely an authoritative reference when it comes to understanding how rootkits work and what you can do to detect or prevent them on your systems.
Jahanzeb Khan and Anis Khwaja provide a wealth of knowledge to help any home user or system administrator implement and secure a wireless network.
There are plenty of overt and direct threats to computer and network security. Intrusion detection, antivirus software and firewall applications are great at monitoring and blocking known or direct attacks. But, lurking in the shadows are a variety of insidious attacks that may go unnoticed. Zalewski provides an in-depth look at passive reconnaissance and indirect attacks and how to protect your systems.
Harlan Carvey is a Windows security instructor who created his own 2-day, hands-on course in Windows incident response and forensic investigations. This book shares some of Carvey's extensive knowledge and expertise in recognizing and responding to attacks on Windows systems in relatively plain English aimed at Windows system administrators. A CD is also included which contains a variety of tools including the PERL scripts described throughout the book.