(Part 2) Best computer networks security books according to redditors

Jump to the top 20

We found 200 Reddit comments discussing the best computer networks security books. We ranked the 55 resulting products by number of redditors who mentioned them. Here are the products ranked 21-40. You can also go back to the previous section.

Next page

Top Reddit comments about Computer Network Security:

u/kenji213 · 44 pointsr/netsec

This book is apparently (i haven't read it myself) extremely beginner oriented, and is more like an introduction to nix than an introduction to Kali.
If you're already proficient in
nix and want to learn the ins and outs of Kali, might i recommend Advanced Kali Pentesting.

It's a little dated, but i've found it to be an very concise and informative resource myself.

u/MrAristo · 26 pointsr/realsocialengineering

Wow, 24 hours and no replies?!

Fine, you know what? FUCK IT!

Alright, first off - While you can concentrate on physical, understanding the basics of the digital side of things will make you more valuable, and arguably more effective. I'll take this opportunity to point you at Metasploit and tell you to atleast spend an hour or so each week working to understand it. I'm not saying you have to know it backwards or inside-out, just get a basic understanding.

But you said you want to go down the physical path, so fuck all that bullshit I said before, ignore it if you want, I don't care. It's just a suggestion.

Do you pick locks? Why not? Come on over to /r/Lockpicking and read the stickied post at the top. Buy a lockpick set. You're just starting so you can go a little crazy, or be conservative. Get some locks (Don't pick locks you rely on!) at a store, and learn the basics of how to pick.

Your fingers will get sore. Time to put down the picks and start reading:

u/z3roTO60 · 12 pointsr/medicalschool

The Rational Clinical Examination: Evidence-Based Clinical Diagnosis, edited by David L. Simel, MD, MHS, and Drummond Rennie, MD

https://www.amazon.com/Rational-Clinical-Examination-Evidence-Based-Diagnosis/dp/0071590307

u/PenTestWS · 10 pointsr/HowToHack

Read through Sparc Flow's books and then take his 24 hour challenge. I did this a couple weeks ago and it was amazing:

Hack Like A Porn Star : Amazon Link

Hack Like A God : Amazon Link

And here is the PenTest Walk Through Guide for the 24 Hour PenTest he offer's as an added service to the two books above:

Ultimate Hacking Challenge : Amazon Link

The hacking challenge is the really fun part. The book will walk you through the entire thing if you get stuck along the way. It took me about 12 hours to get through the full challenge. Its like an extra $10 with the discount you'll find inside either book. $15 without if I remember correctly.

u/kgtx · 8 pointsr/lowlevel

OSDev - http://wiki.osdev.org/Main_Page

Kernel programming - http://stackoverflow.com/a/12818021

Books:

Hacking the Art of Exploitation - This is a fun book that has a lot to do with programming in C, exploring memory and disassembly.

Practical Reverse Engineering - this is a very informative and short book which is pretty close to the metal in regards to memory and all that but is strongly focused on its namesake so I wouldn't get it if it's not your thing.

LittleOS Book - like 76 pages on building your own OS (also free!).

u/[deleted] · 6 pointsr/TOR

I'm not the most advanced individual on the sub but I got alot of decent info from this book:

https://www.amazon.com/Tor-Dark-Art-Anonymity-Invisible-ebook/dp/B00XRZW8F0

The author goes into a decent amount of detail on the various methods of protecting privacy and anonymity on the web. He also covers and debunks a lot of the arguments against protecting your anonymity and covers which tools are best for various threat models, and even discusses why he got into this stuff to begin with. If you are just starting, and don't mind reading a literal book on the topic, it is pretty good.

u/Kalabaster · 6 pointsr/AskNetsec

How has the holy trinity not been mentioned?

Incident Response & Computer Forensics, Third Edition

  • This one will hit a lot of the beats you're looking for, even though it's a bit old (up to Win7) but still has the majority of things you need to get in there. Learn this book at 50% retention and you'll be better than a good majority of the IR professionals currently billing hours.

    Practical Malware Analysis
  • Less focused on attack to defense relationships but lays the groundwork for a better look into what and why certain things "be how they be"

    Art of memory forensics
  • Rounds it all out a bit with some fresh volatility goodness
u/nightmare247 · 5 pointsr/netsecstudents

Part of that "80%" can be a sales tactic to get you to sign up and take the course. Although I am not in the UK so I am not sure if that stat holds true.

As for the equipment: Both the below links are good starting points. The top one is a bit older.

Build Your Own Security Lab: A Field Guide for Network Testing

[The Network Security Test Lab: A Step-by-Step Guide] (https://www.amazon.com/Network-Security-Test-Step-Step/dp/1118987055/ref=asap_bc?ie=UTF8)

Both will give you a good idea and a starting point.

But you never really answered a key question: What is it you want to do? In CyberSecurity, there are roughly 40 different types of emphasis that you can focus on. I know it is daunting, but understand your personality and goals can weigh heavily into that decision. Not everyone is cut out to be a WhiteHat, but that does not mean a blue team member or a purple team member are not for you.

There was a really good topic discussion on Reddit (unable to find it currently) that had quite a few jobs broken down and what they do/mean to the Security Community.

u/PM_ME_YOUR_SHELLCODE · 4 pointsr/RELounge

Reversing: Secrets of Reverse Engineering - Is probably the most common book recommendation. Its an older book (2005) but its about as gentle as it gets in terms of the core concepts but its missing a bit due to its age (32bit RE only). I'd liken it to something like Hacking: The Art of Exploitation for exploit developers. Its a solid book, it covers the fundamentals but it'll take a bit more work to get up to speed.

Practical Reverse Engineering - This one is a newer book (2014) while it doesn't cover as many topics as the above book, its less dated in what it does cover, and it does cast a wider net covering things you'll see today like ARM and x64 instead of just x86. I tend to recommend starting with this book, using Reversing and the next book as a reference if there is a chapter of interest.

Practical Malware Analysis - While this one has more traditional RE introduction, where it excels is in dynamic analysis and dealing with software that doesn't want to be analyzed. Now, its from 2012 and malware has changed since then, so its age certainly shows, but again fundamentals remain even if technical details change or are expanded upon.

Practical Binary Analysis - This is the newest book of the list (December 2018). It wouldn't use it alone, but after you've gone through any of the above books, consider this an add-on. Its focus is on dynamic analysis and its modern. I'll admit I haven't read the entire thing yet, but I've been pleased with what I have read.

Edit: s/.ca/.com/g

u/emg500 · 3 pointsr/medicalschool
u/Rex9 · 3 pointsr/Cisco

1 - DHCP - IMO a really bad idea. The appliance's interfaces should be static IP's. You have to be able to manage it and it needs the same IP. You could do a DHCP reservation, but at that point, why not go ahead and leave it static? It has to be reachable to be managed, and if it's a gateway device, those interfaces have to be reachable.

2 - Not at work right now, but I seem to remember the Device > Interfaces page has a field to set the MAC. Never done the virtual though so YMMV.

3 - In the FMC ACP page there's a search box in the upper right. It searches for whatever you type in any field in the ACP. Up and down arrows to scroll through all the matches. Same in the Objects pages.

4 - I haven't really looked, but it would be nece to get more than 25 at a time.

5 - Todd Lammle writes a really good book that you can get on Amazon.

https://www.amazon.com/Cisco-Firepower-6-x-Threat-Defense-ebook/dp/B06XYXCVQ8/ref=sr_1_8?ie=UTF8&qid=1497956555&sr=8-8&keywords=todd+lammle

His class is also excellent. Better than Cisco's by a mile. Did both last summer. Cisco's spends more time on the non-ASA devices, but that's probably not an issue for 90% of people. The concepts are the same across the ASA and Sourcefire devices. The execution is a little different. If I had 5X the budget, I'd love to have one of the Sourcefire-designed devices.

u/nicklauscombs · 3 pointsr/netsec

best advice i can give is to start reading anything and everything you can get your hands on related to programming, operating systems, networking, security, etc......



a few books i'm reading/have read/on my list to read and all are excellent starting points:

BackTrack 4: Assuring Security by Penetration Testing (this book was just released and still relevant when using BackTrack5)

Metasploit: The Penetration Tester's Guide

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition



plenty of links to keep you busy for awhile:
Open Penetration Testing Bookmarks Collection

u/amazon-converter-bot · 2 pointsr/FreeEBOOKS

Here are all the local Amazon links I could find:


amazon.co.uk

amazon.ca

amazon.com.au

amazon.in

amazon.com.mx

amazon.de

amazon.it

amazon.es

amazon.com.br

amazon.nl

amazon.co.jp

amazon.fr

Beep bloop. I'm a bot to convert Amazon ebook links to local Amazon sites.
I currently look here: amazon.com, amazon.co.uk, amazon.ca, amazon.com.au, amazon.in, amazon.com.mx, amazon.de, amazon.it, amazon.es, amazon.com.br, amazon.nl, amazon.co.jp, amazon.fr, if you would like your local version of Amazon adding please contact my creator.

u/NatalieMac · 2 pointsr/jquery

You could check out my book. :-)

u/iheartrms · 1 pointr/sysadmin
u/RocketTech99 · 1 pointr/PFSENSE

Not to knock Jim and Chris' book- I have it and it's an excellent resource- but there are other resources out there which may better suit your current level, such as pfSense 2 Cookbook which has step-by-step walk throughs of common features.

u/Elusive_Bear · 1 pointr/oscp

That book is a bit out of date. I'd recommend

Basic Security Testing With Kali Linux, Third Edition https://www.amazon.com/dp/1725031981/ref=cm_sw_r_cp_apa_i_mf-DCbFRVVDBK

u/dunsany · 1 pointr/consulting

If you want to flip over and look at how to prep firms for doing IT Security audits (aka build a security program that works and meets standard compliance frameworks), I did a book on that. https://www.amazon.com/Security-Risk-Control-Management-Preparation/dp/1484221397
I emphasize a bunch on SOX audits (via SSAE 16/18) which is huge mystery for a lotta IT shops to deal with, especially a CPA walks thru the door and sees how poor the written processes and policies are around basic IT controls. Seriously, there is a strong need for someone with auditor experience to consult to get folks ready.

u/gaten · 1 pointr/netsec

I'd suggest "The Mobile Application Hacker's Handbook" (http://www.amazon.com/The-Mobile-Application-Hackers-Handbook/dp/1118958500).

Combine it with "The Web Application Hacker's Handbook" (http://www.amazon.com/gp/product/1118026470/) and you should have a pretty good handle on testing mobile security, including the backend stuff.

These are both from a "breakers" point of view, but they go into how to secure/prevent the various attacks they teach, so are a very good source for developers.

As some general tips and what to look for, especially concerning secure communications, look into certificate pinning, message signing, and don't store anything sensitive on the device without encryption (or on the server).

Source: I break mobile apps and websites for a living

u/ThreshingBee · 1 pointr/HowToHack

> WAHH is still updated with newer editions

I tried again and can't find anything newer than the 2011 2nd edition. Do you have a newer Amazon link, publication year, or something for a newer edition of WAHH?

I did find newer works in the same series (1, 2, 3, 4), but not an update to WAHH.

u/quietyoufool · 1 pointr/sysadmin

Only read Ch 5. Lock Picking so far. That was very informative. If the rest of the book is as good (and Amazon reviews indicate it is), I'd go for it.

u/CaptainJeff · 0 pointsr/netsec

Mobile Application Security for Android (so, doing AppSec right when you're building an Android app).
http://www.amazon.com/Application-Security-Android-Platform-Permissions/dp/1449315070