In this section, I am posting all the books I have read or currently reading and I consider relevant for their content with this blog.

/*2020*/

Book Review: Managing Cyber Risk

Book Review: Industrial Network Security

Leading change, our iceberg is melting by John Kotter

/*2019*/

Network attacks and Exploitation: A Framework

How they rule the world: The 22 secret strategies of global power

/*2018*/

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents

/*2017*/

Intelligence-Driven Incident Response

Cyber Deception: Building the Scientific Foundation

/*2016*/

Incident Response & Computer Forensics 3rd edition

Security Intelligence: A practitioner’s guide to solving enterprise security challenges

Malware forensics field guide for Windows systems

Learn about firewall design, Juniper Networks by Judy Thompson-Melanson

/*2015*/

Information Security Analytics: finding security insights, patterns and anomalies in big data

Ten strategies of a World-Class Cybersecurity Operations Center by Carson Zimmerman

Python for Informatics: Exploring Information by Dr. Charles R. Severance

Android Malware and Analysis by Ken Dunham.

How to define and build an effective Cyber Threat Intelligence Capability by Henry Dalziel and Eric Olson.

Practical Packet Analysis: Using Wireshark to Solve Real – World Network Problems by Chris Sanders.

Network Forensics Tracking Hackers Through Cyberspace by Sherri Davidoff and Jonathan Ham.

The practice of Network Security Monitoring by Richard Bejtlich

The applied network security monitoring – collecction, detection and analysis by Chris Sanders and Jason Smith