-- Doc4, "ITSecurity Reading".

Information Technology Security Reading is a subjective subject. Here are some recognised quality reading sources.

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defences by Ed Skoudis (Author)

Mastering Network Security by Chris Brenton, Cameron Hunt

Intrusion Signatures and Analysis by Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick

Hackers Beware: The Ultimate Guide to Network Security by Eric Cole

SANS GIAC Certification: Security Essentials Toolkit (GSEC) by Eric Cole (Author),

The Protocols (TCP/IP Illustrated, Volume 1) by Richard Stevens














All text is available under the terms of the GNU Free Documentation License.