Network Security (Both LAN and Internet)

(maintained by Rob Slade)

"802.11 Security", Bruce Potter/Bob Fleck

"Apache Security", Ivan Ristic

"Authentication Systems for Secure Networks", Oppliger

"Big Book of IPsec RFCs", Pete Loshin

"Bluetooth Security", Christian Gehrmann/Joakim Persson/Ben Smeets

"Building Linux Virtual Private Networks (VPNs)", Oleg Kolesnikov/Brian Hatch

"Botnets: The Killer Web App", Craig A. Schiller

"Building Secure Wireless Networks with 802.11", Jahanzeb Khan/Anis Khwaja

"Building Internet Firewalls", Elizabeth D. Zwicky/Simon Cooper/D. Brent Chapman

"CyberShock", Winn Schwartau

"Cyber Spying", Ted Fair/Michael Nordfelt/Sandra Ring

"Configuring SonicWALL Firewalls", Chris Lathem et al

"Cryptography and Network Security", William Stallings

"Designing and Building Enterprise DMZs", Ido Dubrawsky et al

"Demystifying the IPsec Puzzle", Sheila Frankel

"Disaster Recovery for LANs", Regis J. "Bud" Bates

"Degunking Your Email, Spam, and Viruses", Jeff Duntemann

"Ending Spam", Jonathan A. Zdziarski

"Extrusion Detection", Richard Bejtlich

"Firewalls and Internet Security", Cheswick/Bellovin

"Firewalls: A Complete Guide", Marcus Goncalves

"Firewalls Complete", Marcus Goncalves

"Fundamentals of Network Security", John E. Canavan

"Hack Attacks Denied", John Chirillo

"Hacking the Cable Modem", DerEngel

"Hacking Wireless Networks for Dummies", Kevin Beaver/Peter T. Davis

"Hack Proofing Your Network", Ryan Russell et al

"Hacker's Challenge", Mike Schiffman

"Honeypots for Windows", Roger A. Grimes

"Honeypots: Tracking Hackers", Lance Spitzner

"Intrusion Detection with Snort", Rafeeq Ur Rehman

"I Love the Internet But I want My Privacy Too", Chris Peterson

"Implementing Intrusion Detection Systems", Tim Crothers

"Implementing IPsec", Elizabeth Kaufman/Andrew Newman

"Implementing Virtual Private Networks", Steven Brown

"Inside Internet Security", Jeff Crume

"Internet Besieged: Countering Cyberspace Scofflaws", Dorothy E. Denning/Peter J. Denning

"Intrusion Detection with Snort", Jack Koziol

"Intrusion Prevention and Active Response", Michael Rash et al

"The Internet Security Guidebook", Juanita Ellis/Timothy Speed

"Internet Security with Windows NT", Mark Joseph Edwards

"Internet Security", Tim Meyers/Tom Sheldon/Joel Snyder

"Intrusion Signatures and Analysis", Stephen Northcutt et al

"Intrusion Detection", Edward G. Amoroso

"Internet Forensics", Robert Jones

"Intranet Security", John Vacca

"Intranet Security: Stories from the Trenches", Linda McCarthy

"Internet Security", Tim Speed/Juanita Ellis

"Internet & TCP/IP Network Security", Uday O. Pabrai/Vijay K. Burgani

"Kerberos: A Network Authentication System", Brian Tung

"Kerberos: The Definitive Guide", Jason Garman

"Lan Disaster, Prevention and Recovery", Corrigan

"LAN Security Handbook", Ellen Dutton

"LAN Desktop Guide to Security, NetWare Edition", Sawicki

"Mobile VPN", Alex Shneyderman/Alessio Casati

"Multicast and Group Security", Thomas Hardjono/Lakshminath R. Dondeti

"Mastering Network Security", Chris Brenton/Cameron Hunt

"Managing Security with Snort and IDS Tools", Kerry Cox/Christopher Gerg

"Network Security", Shaffer/Simon

"Network Security Assessment", Steve Manzuik/Andre Gold/Chris Gatford

"Nmap Network Scanning", Gordon Lyon

"Network Intrusion Detection", Stephen Northcutt

"Network and Internetwork Security, William Stallings

"Intrusion Detection", Rebecca Gurley Bace

"Internet Denial of Service", Jelena Mirkovic et al

"Network Security Assessment", Chris McNab

"Network Security for Dummies", Chey Cobb

"Network Security Essentials", William Stallings

"Network Security Secrets", Stang

"Network Security Fundamentals", Gert De Laet/Gert Schauwers

"Network Security First-Step", Tom Thomas

"Network Security Hacks", Andrew Lockart

"Network Security Jumpstart", Matthew Strebe

"Network Security Tools", Nitesh Dhanjani/Justin Clarke

"Network Security", Richard Baker

"Network Security", Kaufman/Perlman/Speciner

"Open Source Security Tools", Tony Howlett

"Practical Computer Network Security", Mike Hendry

"Protected Internet, Intranet, and Virtual Private Networks", Alexander Moldovyan et al

"Practical Firewalls", Terry William Ogletree

"Practical Packet Analysis", Chris Sanders

"Preventing Web Attacks with Apache", Ryan C. Barnett

"Practical VoIP Security", Thomas Porter et al

"Risk Management Solutions for Sarbanes- Oxley Section 404 IT Compliance", John S. Quarterman

"Security Fundamentals for E- Commerce", Vesna Hassler

"Security Log Management", Jacob Babbin et al

"Security Technologies for the World Wide Web", Rolf Oppliger

"Security Monitoring", Chris Fry/Martin Nystrom

"Slamming Spam: A Guide for System Administrators", Robert Haskins/Dale Nielsen

"Security Monitoring with Cisco Security MARS", Gary Halleen/Greg Kellogg

"Snort Cookbook", Angela Orebaugh/Simon Biles/Jacob Babbin

"Security Sage's Guide to Hardening the Network Infrastructure", Steven Andres/Brian Kenyon

"SSH The Secure Shell", Daniel J. Barrett/Richard E. Silverman

"SSL and TLS", Eric Rescorla

"Top Secret Intranet", Fredrick Thomas Martin

"Troubleshooting Linux Firewalls", Michael Shinn/Scott Shinn

"VPNs: A Beginner's Guide", John Mairs

"Virtual Private Networking", Bruce Perlmutter/Jonathan Zarkower

"Virtual Honeypots", Niels Provos/Thorsten Holz

"Web Security", Rohit Khare

"WarDriving: Drive, Detect, Defend", Chris Hurley/Frank Thornton/Michael Puchol

"Web Security and Commerce", Simson Garfinkel/Gene Spafford

"Web Security, Privacy and Commerce", Simson Garfinkel/Gene Spafford

"Web Security Testing Cookbook", Paco Hope/Ben Walther

"Web Security: A Step-by-Step Reference Guide", Lincoln D. Stein

"WiFi Security", Stewart S. Miller

"Wireless Security", Merritt Maxim/David Pollino

"Wireless Security", Randall K. Nichols/Panos C. Lekkas

"Wireless Security End to End", Brian Carter/Russell Shumway

"Wireless Security Essentials", Russell Dean Vines

"XSS Attacks", Jeremiah Grossman et al

HyperText version Book Review Index (may take a while to load)

Book reviews main topic menu