Books
![](/wp-content/uploads/2018/11/Nessus.png)
Nessus Network Auditing
by Jimmy Alderson, Jay Beale, et al
![](/wp-content/uploads/2018/11/Ethereal.png)
Ethereal Packet Sniffing
by Jay Beale, et al
![](/wp-content/uploads/2018/11/NessussSnort.png)
Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications
by Jay Beale, et al
![](/wp-content/uploads/2017/04/images-1.jpeg)
Snort 2.1
by Mike Poor, Jay Beale, et al
![](/wp-content/uploads/2018/11/Screen-Shot-2018-11-20-at-2.19.01-PM.png)
Stealing The Network: How to Own a Continent
by Jay Beale, et al
![](/wp-content/uploads/2018/11/Screen-Shot-2018-11-20-at-2.23.20-PM.png)
Stealing The Network: How to Own an Identity
by Jay Beale, et al
![](/wp-content/uploads/2018/11/RedHat.png)
Red Hat Linux Internet Server
by Jay Beale, et al
![](/wp-content/uploads/2018/11/Screen-Shot-2018-11-20-at-3.22.49-PM.png)
Unix Unleashed
by Jay Beale, et al
![](/wp-content/uploads/2018/11/Screen-Shot-2018-11-20-at-2.48.35-PM.png)
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
by Chris Sanders
![](/wp-content/uploads/2018/11/Screen-Shot-2018-11-20-at-2.46.55-PM.png)
Applied Network Security Monitoring: Collection, Detection, and Analysis
by Chris Sanders
![](/wp-content/uploads/2017/04/images-2.jpeg)
Malware: Fighting Malicious Code
by Ed Skoudis and Lenny Zeltser
![](/wp-content/uploads/2018/11/Screen-Shot-2018-11-20-at-3.26.40-PM.png)
Counter Hack
by Ed Skoudis
![](/wp-content/uploads/2017/04/images.jpeg)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
by Ed Skoudis and Tom Liston
All links are non-affiliated