Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Ask A Librarian HoursLibrary CatalogArticle Databases RESEARCH SERVICESHELPINFORMATION FOR...

Cyber Forensics and Security (CFS): Recommended Books

Google It

Scholar often displays significant portions of books...maybe the sections you are hoping to find?

Google Scholar Search

What if Marshall doesn't have the book that I want?

Do you need a book that Marshall doesn't own?  You have great options:

  • EZ Borrow is a group of more than 50 academic libraries, mostly in Pennsylvania.  You can request books and in many cases the books will be ready for pick-up in 3-5 business days.  The check-out period is 6 weeks.
  • IDS/ILL  is our Information Delivery and InterLibrary Loan service.  This is a free service and can be used for books and items that are not available through EZ Borrow.  It may take longer to obtain books so be sure to plan ahead.

Recommended Books

Dissecting The Hack: The Forb1dd3nNetwork. Jayson Street, Kent Nabors, Brian Baskin. Syngress; Revised Edition (July15, 2010). ISBN-13: 978-159749568

Metasploit: The Penetration Tester's Guide. David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni; No Starch Press; 1st Edition, (July 22, 2011). ISBN-13: 978-1593272883

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Gordon (Fyodor) Lyon, Nmap Project (January 1, 2009). ISBN-13: 978-0979958717

Defensive Countermeasures: The Art of Active Defense. John Strand, Paul Asadoorian; Pauldotcom; 1st Edition (July 2013). ISBN: 9781491065969

Social Engineering: The Art of Human Hacking. Christopher Hadnagy. Wiley; 1st Edition (2011). ISBN: 978-0-470-63953-5

Google Hacking: For Penetration Testers. Johnny Long. Syngress: 1st Edition (2005). ISBN: 1-931836-36-1

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Johnny Long. Syngress: 1st Edition (February 2008). ISBN-13:978-1597492157

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker. Kevin D. Mitnick.  Little, Brown and Company; 1st Edition (August 15, 2011). ISBN-13: 978-0316037709

 Wireshark 101: Essential Skills for Network Analysis. Laura Chappell, Gerald Combs,  Laura Chappell University (February 1, 2013). ISBN-13: 978-1893939721

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers, TJ O’Conner, Syngress (November 22, 2012). ISBN-13: 978-1597499576

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanner, Gordon (Fyodor) Lyon, Nmap Project (January 1, 2009). ISBN-13: 0979958717

Cyber Warfare, Jason Andress, Steve Winterfeld. Syngress; 1st Edition (June 1, 2011). ISBN-13: 978-1597496377

Cyber War, Richard A. Clarke. Harper Collins; Reprint Edition (April 10, 2012). ISBN-13: 978-0061962240

Inside Cyber Warfare, Jeffrey Carr. O'Reilly; 2nd Edition (December 28, 2011). ISBN-13: 978-1449310042

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Jason Andress. Syngress; 1st Edition (June 24, 2011). ISBN-13: 978-1597496537

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Patrick Engebretson. Syngress; 1st Edition (April 4, 2011). ISBN-13: 978-1597496551

Building an Information Security Awareness Program, Bill Gardner and Valerie Thomas. Syngress.

Introduction to Infomation Security, Timothy J. Shimeall and Jonathan M. Spring. Syngress.

Confront and Conceal, David E. Sanger, Broadway.

IT Security Metrics, Lance Hayden, McGraw Hill.

Security Metrics: A Beginner's Guide, Caroline Wong, McGraw Hill

Analyzing the Social Web, Jenifer Golbeck, Morgn Kaufman.

The Basics of Digital Forensics, John Sammons, Syngress.

Ethical Hacking and Countermeasures: Attack Phases

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms

Ethical Hacking and Countermeasures: Web Applications and Data Servers

Ethical Hacking and Countermeasures: Linux, Macintosh, and Mobile Systems

Ethical Hacking and Countermeasures: Secure Network Infrastrctures

Penetration Testing: Security Analysis

Penetration Testing: Procedures and Methodologies

Penetration Testing: Network and Perimeter Testing

Penetration Testing: Communication Media Testing

Penetration Testing: Network Threat Testing

CISSP Exam Cram 2

Certified Ethical Hacker Exam Prep

 

Subject Guide

Profile Photo
Larry Sheret
Contact:
Drinko 213 C (Next to the Writing Center)

Phone (304) 696-6577