Tuesday, August 25, 2015

Learning Resource In Computer Security and Digital Forensic[Books]

Books
Security:
1.Computer Security Principle and Practice 2011
2.Engineering Security by Peter Gutmann 2013
3.Essential System administration 3rd edition
4.Introduction to Information Security. A Strategic-Based Approach (2014)
5.Security Engineering by Roose Andeson
6.Introduction to  Security and Network Forensic by William J.Buchanan
7.Corporate Computer and Network Security

Forensic Investigation:
1.Guide to Computer Forensics and Investigations (with DVD) 5th Edition by Bill Nelson
2.Digital Forensics with the AccessData Forensic Toolkit (FTK)|
3.Forensic Examination of Windows Supported File System by Doug Elrick
4.Computer Forensics with FTK by Fernando Carbone 
5.Official (ISC)2® Guide to the CCFP CBK-Auerbach Publications,CRC Press
6.EC-Council-Investigating Data and Image [Computer forensic]
7.The official CHFI study guide
8.Computer Forensics and Cyber Crime  An Introduction, 3rd Edition by Marjie T. Britz
9.Digital Evidence and Computer Crime, Third Edition Forensic Science, Computers, and the Internet-Academic Press
10.File System Forensic Analysis[must read]
11.Forensic with open source tools
12.Hacking Exposed Computer Forensic
13.Understand Forensic Digital Imaging

Operating System architecture and Attacks:
1.Writing security tools and exploits by James C Foster
2.A bug hunter's diary a guided tour through the wilds of software security
3.Buffer Overflow Attacks
4.The Art of Software Security Assesment
5.Organization and Architecture Designing for Performance(8th Edition)
6.Discovering Computer
7.Exploiting Software How To Break Code
8.Writing Security Tools and Exploits
9.The Architecture of Computer Hardware,System Software and Networking
10.Modern Operating System
11.How computer works

Penetration Testing:
1.Basic Security Testing with Kali Linux 2.Google hacking v1 and v2 
3.Gray Hat Hacking The Ethical Hackers Handbook, 4th Edition
4.Hacking: The Art of Exploitation, 2nd Edition
5.Metasploit: The Penetration Tester's Guide by Jim O'Gorman
6.Backtrack 5 Wireless Penetration Testing Beginner's guide
7.Instant Penetration Testing: Setting Up a Test Lab How-to
8.Backtrack 5 cook book /Backtrack 5 wirelsess penetration testing 9.Counter Hack Reloaded,2nd
10.A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
11.Hacker Techniques, Tools and Incident
12.Black Hat Python: Python Programming for Hackers and Pentesters
13.Kali Linux- Assuring Security by Penetration Testing by Allen, Lee 14.Learning Metasploit Exploitation and Development by Balapure, Aditya
15.No starch Metasploit 16.Penetration Testing : A hands on guide to hacking
17.The hacker Playbok 1 and 2
18.Ethical hacking and Penetration Testing Guide

Assembly Language:
1.Introduction to 64 bit windows Assembly Programming Ray Seyfarth
2.Assembly Language for x86 Processors 6th Edition
3.Assembly Language Step by Step programming with Linux(must Read)
4.Professional AT & T Assembly Language
5.Introduction to assembly language programming for pentium and risc processors
6.KIP R. IRVINE-Assembly Language for x86 Processors-Pearson (must Read)
8.The Art of Assembly Language
9.Intel 64 and IA-32 Architectures Software Developer's Manual

Cryptography:
1.Cryptography and Network Security: Principles and Practice (6th Edition) by William Stallings
2.Applied Cryptography: Protocols, Algorithms and Source Code in C
3.Break the Code: Cryptography for Beginners
4.Introduction to Modern Cryptography, Second Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
5.An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
6.Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)
7.Practical Cryptography
8.An Introduction to Number Theory with Cryptography
9.Implementing SSL / TLS Using Cryptography and PKI
10.Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More(Must Read)
11.Cryptography Engineering: Design Principles and Practical Applications 1st Edition

12.Modern Cryptanalysis: Techniques for Advanced Code Breaking
13.Malicious Cryptography: Exposing Cryptovirology
14.Cryptanalysis of Number Theoretic Ciphers (Computational Mathematics)

15.A Course in Number Theory and Cryptography (Graduate Texts in Mathematics)
16.Beginning Cryptography With Java(must Read)
17.Algorithmic Cryptanalysis (Chapman & Hall/CRC Cryptography and Network Security Series) 1st Edition
18.Applied Cryptanalysis - Breaking Ciphers in the Real World
19..BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic
20.Codes - The Guide to Secrecy from Ancient to Modern Times
21.Cryptography for Developers

Reverse Engineering:
1.Sockets Shellcode Porting And Coding Reverse Engineering Exploits And Tool Coding For Security Professionals no secret
2.Reversing: Secrets of Reverse Engineering
3.Practical reverse engineering  x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation-Wiley

Malware Analyst:
1.Advanced Malware Analysis by Christopher Elisan
2.Hacking Exposed :Malware and Rootkits
3.Predicting Malicious Behavior:Tools and Techniques for Ensuring  by Gary M.Jackson
4.Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 5.The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System, Second Edition
6.Malware Forensics Field Guide for Linux Systems  Digital Forensics Field Guides-Syngress (2014)
7.Malware Analyst Cookbook
8.Malware forensics Field guide for Windows Systems Digital Forensic Field Guides
9.Designing BSD rootkits an indtroduction to kernal hacking
10.Rookts Subverting the Windows Kernel
11.The Art of Memory Forensic Detecting Malware and Threats in Windows,Mac and Linux memory 

Linux and Shell Code:
1.CompTIA Linux+ Study Guide Exams (2013)
2.The Shellcoder's Handbook: Discovering and Exploiting Security Holes by Chris Anley
3. UNIX and Linux System Administration Handbook, 4th Edition
4.Linux Command line and shell scripting bible
5.Linux Kernal Development 3rd
6.A practical Guide to Linux Command,Editor and Shell Scripting
7. Linux Command Line and Shell Scripting Bible
8.Understand The Linux Kernel
9.How Linux Works What Every Superuser Should Know
10.Linux+ Guide to Linux Certification 3rd
11.Linux Bible 2013
12.Linux Fundamental by Paul Cobbaut
13.Linux in a nutshell
14.Linux System Programming

Linux Forensic:
1.Linux Forensics by Philip Polstra

Database Forensic:
1.The Database Hacker handbook
2.The Manga Guide to Database
3.Digital Image Forensics: There is More to a Picture than Meets the Eye

Windows Forensic:
1.Advance windows debugging by Mario Hewardt
2.Windows PowerShell Cookbook
3.Windows Registry Forensics Advance by Harlan Carvey
4.Windows 8.1 Bible
5.Windows 8.1 inside out
6.Hacking Exposed Windows 3rd Edition
7.Windows Forensic Analysis Toolkit. Advanced Analysis Techniques for Windows 8
8.Windows Forensic Analysis Toolkit, Advanced Analysis Techniques for Windows 7
9.Windows Sysinternals Administrator's Reference  -Microsoft Press
10.Microsoft Windows Operating System Essentials by Tom Carpenter
11.Windows Internals(Part 1 and 2)
12.Windows Server 2012 R2 Inside Out, Configuration, Storage, & Essentials-Microsoft Press

Mac Forensic:
Will update Soon

Mobile Forensic:
1.Android Security Internals
2.Mobile Forensic Investigation: A guide to Evidence collection, analysis and presentation by Lee Reiber
3.Iphone and ios forensic by Andrew Hoong
4.Android Malware and Analysis-Auerbach Publications by Ken Dunham
5.Ios Forensic Analysis by Sean Morrissey
6.Iphone forensics:recovering evidences by Jonathan Zdziarski

Network Forensic
1.Network Attacks and Exploitation :A frame work by Matthew Monte
2.Wireshark for Security pro:Using wireshark and the metasploit framework Jessey Bullock
3.Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon Fyodor Lyon
4.Wireshark Network Analysis, Second Edition by LauraChappel
5.The Tao of Network Security Monitoring: Beyond Intrusion Detection
6.Practical Packet Analysis:Using Wireshark to Solve Real-World Network Problems, 2nd Edition  -No Starch Press (2011)
7.Cisco Networking Essentials
8.Hands on hacking and Network defence infosec
9.Modern Wireless attack
10.Network Forensics Tracking Hackers through Cyberspace
11.Nmap Cookbook:The Fat-free Guide to Network Scanning
12.Mastering Windows Network Forensics and Investigation
13. WireShark101

Web Attack:
1.SQL Injection Attacks and Defense, Second Edition
2.The Web Application Hacker's Handbook, Second Edition
3.The Tangled Web:A guide To Securing Modern Web Applications
4.XSS Exploits Cross Site Scripting Attacks and Defense
5.Web Application Obfuscation
6.The Web Application Hackers Handbook
7.Hacking Expose Web 2.0

Programming:
1.Python Forensic by Chet hosmer
2.Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming
3.Gray Hat Python: Python Programming for Hackers and Reverse Engineers
4.Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor

Privacy and Data Hiding
1.Hiding from the Internet: Eliminating Personal Online Information
2.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
3.Personal Digital Security: Protecting Yourself from Online Crime
4.Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
5.Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady 6.Darknet: A Beginner's Guide to Staying Anonymous Online

















































No comments:

Post a Comment