Nessus
Network Auditing
by Jimmy Alderson, Jay Beale, et al
Etheral
Packet Sniffing
by
Jay Beale, et al
Nessus,
Snort, Ethereal Powertools:
Customizing
Open Source Security
Applications
by
Jay Beale , et al
Red
Hat Internet Server
by
Jay Beale , et al
Stealing
The Network:
How
to Own a Continent
by
Jay Beale , et al
Stealing
The Network:
How
to Own an Identity
by
Jay Beale , et al
Unix
Unleashed
by
Jay Beale , et al
Snort
2.1
by
Mike Poor, Jay Beale, et al
Counter
Hack
by
Ed Skoudis
Counter
Hack Reloaded
by
Ed Skoudis, and Tom Liston
Malware:
Fighting Malicious Code
by
Ed Skoudis with Lenny Zeltser