Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

I know quite a bit capturing and manipulating network traffic, but I never really learned how to do interception via mechanisms like ARP poisoning, etc-- this book has succinct coverage of many such techniques. It covers interception across all major platforms (Windows, Mac, Linux) and introduces the open-source Canape interception toolkit which makes many tasks simple. Beyond the "how" of using tools, the book covers practical techn...

EW 104 : EW Against a New Generation of Threats

Worth Every Cent If You Want to Know Electronic Warfare. I can't recommend this 442 page tome enough. Of course you will need the EW 101, 102 &103 EW books if you want to fully understand this latest volume by a master writer of engineering electronic warfare lecturer David L. Adamy who is one of the leaders of the 14,000 members of the Society of Old Crows. For EW 104 the chapters are laid out by the following categories: 1) Spe...

Detecting and Mitigating Robotic Cyber Security Risks

Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research ...

BTFM: Blue Team Field Manual

This is very useful and concise reference book for both someone with some experience in the cybersecurity field, and for a beginner to learn useful command that may be recommended practices that they might not be aware of. Also the list of tool suites that is helpful.

DNS Security For Dummies (Infoblox Special Edition)

This is an excellent book for both beginners and those with some knowledge of DNS and how it works. It starts with the basics and includes how DNS relates to TCP/IP and the OSI model. It continues with setting up your DNS servers and troubleshooting. It continues on with more advanced concepts and security issues. All this is in a very readable format.

Empirical Research for Software Security :(Series in Security, Privacy and Trust)

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book...

Why Cops Die (And How to Prevent It)

Assembled by a police chief who spent 15 years as a sergeant, Why Cops Die (And How To Prevent It) is a manual filled cover to cover with advice for countering threats to a law enforcement officer's safety. Although Why Cops Die is written especially for police officers, anyone who needs or wants to understand just how dangerous police work is can learn from the anecdotes, case studies, and solid guidelines that responsible cops use ...

African Security in the Twenty-First Century : Challenges and Opportunities

This book provides a highly useful and comprehensive look through the human security perspective of key security challenges facing Africa today and tomorrow. The use of this unifying human security framework makes the book well-suited as a core text for African regional studies. Or it should have been. Thanks to ill-advised and short-sighted publisher decisions, what we have instead is an overpriced $115 hardback that is more likely ...

Security, Privacy and Reliability in Computer Communications and Networks

Very thorough and descriptive of different state-of-the-art networking issues! A must read for those are interested in today's computer networking technologies! Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication n...

Beautiful Security: Leading Security Experts Explain How They Think

Like O'Reilly's Beautiful Teams, this book's a series of essays by industry experts, this time focused on security. The various authors do a great job of covering topics from social engineering to forcing firms to focus on security. The chapters are all well-written, although a few do better jobs of keeping the material interesting and flowing. You'll find plenty of security-related history in the book. Phil Zimmerman's chapter on PG...