A List of I.T. Security Books

This is a list of I.T. Security books.

Applied Cryptography: Protocols, Algorithms and Source Code in C

Building Secure and Reliable Systems: SRE and Security Best Practices

Database Security

Defend I.T.: Security by Example

Hack I.T. - Security Through Penetration Testing

Hacking Exposed Web Applications, Third Edition

Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Hadoop Security: Protecting Your Big Data Platform

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Identity and Data Security for Web Development: Best Practices

Implementing Database Security and Auditing

Internet Security: How to Defend Against Attackers on the Web (Jones & Bartlett Learning Information Systems Security & Assurance)

Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series)

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

Microsoft Windows Security Essentials

Multilevel Security for Relational Databases

Network Security Through Data Analysis: From Data to Action

Oracle Database 12c Security

The Penetration Tester's Guide to Web Applications (Artech House Computer Security Series)

Practical Web Penetration Testing: Secure web applications using Burp Suite, Nmap, Metasploit, and more

Pro ASP.NET Web API Security: Securing ASP.NET Web API (Expert's Voice in .NET)

Securing DevOps: Security in the Cloud

Security for Web Developers: Using JavaScript, HTML, and CSS

The Tangled Web: A Guide to Securing Modern Web Applications

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

Web Application Security is a Stack: How to CYA (cover your apps) completely

Web Security

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

Web Services Security

Windows Security Monitoring: Scenarios and Patterns

**********************************

For Docker container hardening, see this link.

Leave a comment

Your email address will not be published. Required fields are marked *