skip to main | skip to sidebar

Extreme Security -- Do It Securely or Not at all !

Sunday, January 25, 2009

Recommended Readings: Latest security books


I recommend reading the following books, becuase they are focusing on malwares, except Nmap network scanning, I know but it's a good addition to your bookshelf.

1) Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


2)Malware Forensics: Investigating and Analyzing Malicious Code


3) HACKING EXPOSED MALWARE AND ROOTKITS


4) Mobile Malware Attacks and Defense


5) Crimeware: Understanding New Attacks and Defenses


Happy Reading :)

at 11:51 AM

|


Newer Post Older Post Home
Subscribe to: Comment Feed (RSS)

Symantec Security Alerts

Experts-Exchange Certified

Experts-Exchange Certified

LinkedIn Profile

View Aa'ed Alqarta's profile on LinkedIn

ExtremeSecurity Groups

ExtremeSecurity on Facebook

Google Groups
Extreme-security
Visit this group

Kuwait Snort Users Group

Kuwait Snort Users Group

Addthis

AddThis Social Bookmark Button

Subscribe Now: Feed Icon

Subscribe in a reader

Google Search

Google

About Me

My photo
Ayed Alqarta
Kuwait, Kuwait, Kuwait
Information security specialist who is watching and reporting "Cyber Warfare" affairs. To contact please send e-mails to (4tharenaofwar@gmail.com)
View my complete profile

Blog Archive

  • ►  2010 (1)
    • ►  May (1)
  • ▼  2009 (5)
    • ►  November (1)
    • ►  March (1)
    • ►  February (1)
    • ▼  January (2)
      • Recommended Readings: Latest security books
      • Beat Downadup/Conficker like a pro: My story from ...
  • ►  2008 (25)
    • ►  December (2)
    • ►  October (1)
    • ►  September (1)
    • ►  July (1)
    • ►  June (6)
    • ►  May (1)
    • ►  April (2)
    • ►  March (4)
    • ►  February (7)

My Favorites

Blogs to watch

  • Alaa Al-Ankar Blog (Exchange Blog)
  • Anti-Malware Engineering Team
  • Arbor Network's Blog
  • Cryptoexperts
  • Errata Security
  • Exploit Prevention Labs
  • F-Secure Labs Blog
  • Fergie's Tech Blog
  • Honeyblog
  • Internet Storm Center
  • Jeremiah Grossman
  • Kaspersky Labs Blog
  • Lance Spitzner
  • McAfee Avert Labs Blog
  • Richard Bejtlich's TaoSecurity
  • Secure Works Labs
  • Sophos Labs Blog
  • Sunbelt Labs
  • Symantec Security Response
  • Virus Blog
  • WebSense labs