SUPLEMENTAL MATERIAL
This page will be updated regularly to include new suplemental material.
TEXTBOOKS
Brooks, C.J., Grow, C., Craig, P.A., Short, D. 2018. Cybersecurity Essentials.
William Stallings and Lawrie Brown. 2014. Computer Security: Principles and Practice (3rd. ed.). Prentice Hall Press, USA.
UPON REQUEST MATERIAL
COMPTIA Security + Certification Guide
Cybersecurity - Attack and Defense Strategies
Digital Forensics and Incident Response
Hands-On Cybersecurity for Architects
Hands-On Cybersecurity with Blockchain
Hands-On Penetration Testing on Windows
Indsutrial Cybersecurity
Kali Linux - An Ethical Hacker's Cookbook
Learning Malware Analysis
Mastering Kali Linux for Advanced Penetration Testing
Mastering pfSense
Metasploit for Beginners
Metasploit for Penetration Testing Cookbook
Network Analysis Using Wireshark 2 Cookbook
Nmap - Network Expoloration and Security Auditing
Practical Cyber Intelligence
Practical Mobile Forensics
Web Penetration Testing with Kali Linux
Advanced Penetration Testing - Hacking the World's Most Secure Networks
Applied Cryptography - Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
Cryptography Engineering - Design Principles and Practical Applications
Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence
Malware Analyst's Cookbook and DVD - Tools and Techniques for Fighting Malicious Code
Practical Reverse Engineering - x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Reversing - Secrets of Reverse Engineering
Security Engineering - A Guide to Building Dependable Distributed Systems, 2nd Edition
The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Shellcoder's Handbook - Discovering and Exploiting Security Holes, 2nd Edition
The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws, 2nd Edition
Threat Modeling - Designing for Security
Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework
CEH v9 - Certified Ethical Hacker Version 9 Study Guide
Secrets and Lies - Digital Security in a Networked World, 15th Anniversary Edition
Social Engineering - The Art of Human Hacking
The Art of Deception - Controlling the Human Element of Security
Unauthorised Access - Physical Penetration Testing For IT Security Teams