Blue Kestrel internet security logo
Blue Kestrel Internet Security
Blue Kestrel internet security logo
Navigation bar - if images switched off in browser then click on site map at bottom of page.
The internet security booksLibrary
Welcome to the library. I have listed some of the most popular books on security and privacy and if you are interested in purchasing a title listed below simply click on the book cover and you will be taken to Amazon where you can read more about the book and purchase a copy if required. I can thoroughly recommend Secrets and Lies. I am also starting to collect freeware books that can be downloaded from this site.
intrusion detection

Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response

This book can be disappointing if you are looking to find out how specific IDS actually work. However, if you are about to embark on the purchase or evaluation of a system this is excellent as it covers the key principles of IDS, and enables you to understand the core functionality. The case studies are excellent and allow you to quickly pick up the principles, and before you know it your understanding of IDS has expanded significantly. It enables you to step into the muddy field of commercial products fairly confident that you know what you are looking for. It is also a very good academic book on the subject of IDS.

hack proofing your network

Hack Proofing your Network

If you don't hack your systems, who will?

One of the reasons I put this book project together is that I believe security professionals should be hackers. In this case, by hackers, I mean people who are capable of defeating security measures. This book purports to teach people how to be hackers. In reality, most of the people who buy this book will do so because they want to protect their own systems and those of their employer. So, how can you prevent break-ins to your system if you don't know how they are accomplished? How do you test your security measures? How do you make a judgement about how secure a new system is? When you're through reading Hack Proofing Your Network, you'll understand terms like 'smashing the stack,' 'blind spoofing,' 'building a backward bridge,' 'steganography,' 'buffer overflow' and you'll see why you need to worry about them. You will learn how to protect your servers from attacks by using a 5-step approach:

secrets and lies
Secrets and Lies is a thorough backgrounder in all aspects of network security, an extremely wide remit that stretches from passwords to encryption, passing through authentication and attack trees along the way. The book is divided in to three broad categories, The Landscape, which covers attacks, adversaries and the need for security; Technologies, which discusses cryptography, authentication, network security, secure hardware and security tricks; and concludes with Strategies, which looks at vulnerabilities, risk assessment, security policies and the future of security. Mercifully there's a dim light at the end of this tunnel and Schnier ultimately remains upbeat about maintaining computer security and details a way forward in his conclusion
inside internet security

Inside Internet Security

This is an engaging tour of the fascinating, slippery subject of Internet security. Beginning with an investigation into what motivates hackers, the author goes on to explore risk analysis, the value and limitations of firewalls, problems with passwords, and why systems are vulnerable to viruses. There is also a look at the problems posed by active content on Web sites, the latest developments in cryptography, and whether virtual private networks (VPNs) are secure.

web security

Web Security

A comprehensive text on web security. It aims to show the reader how to formulate and implement a security policy and protect their web setup from intrusion, sabotage, eavesdropping and tampering. A companion CD ROM contains firewalls, cookie killers, sniffers and encryption tools.

The companion CD ROM contains an array of NT 5.0, Windows 98 & Windows 95 tools to scan networks, Web servers and sites for vulnerabilities, tools to break into networks and web servers, encryption tools, Firewall software, cookie killers, digital signers, log analysis and dictionary based password cracking tools to give a reality check to your best bets on security. A companion website links you to the latest in the security scene both from the Underground and the industry and lets you access a variety of resources to keep up to date in this dynamic field. Rather than focus on Unix, this book focuses on the Windows platform, covering NT, Windows 98 and 95 , which is becoming the preferred platform for web development.

network intrusion detection

Network Intrusion Detection an Analyst's Handbook

A collection of after-action reports on a variety of network attacks, Network Intrusion Detection enables you to learn from others' mistakes as you endeavour to protect your networks from intrusion. Authors Stephen Northcutt and Judy Novak document real attacks on systems, highlighting characteristics you--you being a network communications analyst or security specialist--can look for on your own machines. The authors mince no words, advising you which detection tools to use (they like and use Snort, as well as Shadow, Tripwire, TCP Wrappers and others) and how to use them. This second edition of the book includes less about Year 2000 preparation and more about the latest in attacks, countermeasures, and the growing community of white-hat hackers who share information to keep systems safe.

Download
THE HACKER CRACKDOWN Law and Disorder on the Electronic Frontier by Bruce Sterling.

This book is a fascinating account of the early hacking activities of the 90's and the law enforcement agencies attempts to control it. The author has made it available as freeware and it can be downloaded from this site. It is in Microsoft Word format but if you would like it in other formats then please email me. It is a 250 page document and is 1.93mb in size.

Evidence eliminator
vote for blue kestrel in security search top 50
fringe of the web top 100
Webmasters Copyright Disclaimer Privacy Policy Contacts Site Map Home

 

Home Page Tutorials internet security news online computer courses internet security articles internet security faq's internet security white papers free internet security software internet security glossary links to other internet security sites internet security books software updates and patches site map