Stevens, W. Richard, TCP/IP Illustrated, Volume 1-3, Addison-Wesley, 1994
- ISBN: 0-201-63346-9
Haugdahl, J. Scott, Network Analysis and Troubleshooting, Addison-Wesley, 2000
- ISBN: 0-201-43319-2
Charles E. Spurgeon, Joann Zimmerman, Ethernet: The Definitive Guide: Designing and Managing Local Area Networks 2nd Edition, O???Reilly, 2014
- ISBN: 978-1449361846
Bejtlich, Richard,??The Tao of Network Security Monitoring: Beyond Intrusion Detection, AddisonWesley, 2004
- ISBN: 978-0321246776
Newton, Harry, Newton???s Telecom Dictionary 31st Edition, CMP Books, 2018
- ISBN: 978-0979387395
Davidson, Jonathan,??Voice over IP Fundamentals, Cisco Press
- ISBN: 978-8176355780
Gast, Matthew S., 802.11 Wireless Networks ??? The Definitive Guide, 2nd Edition, O???Reilly, 2005
- ISBN: 0-596-10052-3
Gast, Matthew S., 802.11n?? A Survival Guide, O???Reilly, 2012
- ISBN: 978-1449312046
Chappell, Laura, Wireshark Network Analysis 2nd Edition, 2012, Chappell University, 2012
- ISBN:?? 1-893939-94-4 / 978-1-893939-94-3
Mitnick, Kevin D. The Art of Deception: Controlling the Human Element of Security, Wiley, 2002
- ISBN: 978-0471237129
Lyon, Gordon ???Fyodor???, NMAP Network Scanning, Insecure.com, LLC, 2008
- ISBN: 978-0-9799587-1-7
Stoll, Clifford, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday, 1989
- ISBN: 978-0385249461
Oppenheimer, Priscilla and Bardwell, Joseph, Troubleshooting Campus Networks,??Wiley, 2002
- ISBN: 0-471-21013-7
Comer, Douglas E., Internetworking with TCP/IP, Volumes 1-5, 3rd Edition, Prentice Hall, 1995
- ISBN: 0-13-216987-8
Doyle, Jeff and DeHaven, Jennifer, Routing TCP/IP, Volume 1 and 2, 2nd Edition, Cisco Press, 2005
- ISBN: 978-1587052026
Hafner, Katie and Lyon, Matthew, Where Wizards Stay Up Late ??? The Origins of The Internet, Simon & Schuster, 1996
- ISBN: 0-684-81201-0
Friedl, Jeffrey E.F., Mastering Regular Expressions 3rd Edition, O’Reilly, 2006
- ISBN: 978-0596528126
Jaswel, Nipun, Mastering Metasploit: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit, 3rd Edition, Packt Publishing, 2018
- ISBN: 978-1788990615
Perlman, Radia, Interconnections: Bridges, Routers, Switches & Internetworking Protocols, 2nd Edition, Addison-Wesley, 2000
- ISBN: 0-201-63448-1
Sanders, Chris, Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems 3rd Edition, No Starch Press, 2017
- ISBN: 978-1593278021
Chappell, Laura, Wireshark 101: Essential Skills for Network Analysis , Chappell University, 2017
- ISBN: 978-1893939752
Ahson, Syed A. and Ilysa, Mohammad, VoIP Handbook: Applications, Technologies, Reliability, and Security,??CRC Press, 2008
- ISBN: 978-1420070200
Minoli, Daniel, Voice Over IPv6: Architectures for Next Generation VoIP Networks, 1st Edition, Newnes Press, 2006
- ISBN: 978-0750682060
Camarillo, Gonzalo, SIP Demystified,??McGraw-Hill Telecom, 2001
- ISBN:?? 978-0071373401
Wallingford, Theodore, Switching to VoIP: A Solutions Manual for Network Professionals,??O’Reilly, 2005
- ISBN: 978-0596008680
Wallingford, Theodore, VoIP Hacks: Tips & Tools for Internet Telephony,??O’Reilly, 2005
- ISBN: 978-0596101336
Sheppard, Andrew, Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service,??O’Reilly, 2005
- ISBN: 978-0596101893
Hartpence, Bruce, Packet Guide to Voice over IP: A system administrator’s guide to VoIP technologies,??O’Reilly, 2013
- ISBN: 978-1449339678
Camp, Ken, IP Telephony Demystified,??McGraw Hill Networking, 2002
- ISBN: 978-0071406703
Walker, John Q. and Hicks, Jeffrey T., Taking Charge of Your VoIP Project,??Cisco Press, 2004
- ISBN: 978-1587200922
Swale, Richard and Collins, Daniel, Carrier Grade Voice Over IP, 3rd Edition, McGraw-Hill Education, 2013
- ISBN: 978-0071827713
Simpson, Wes, Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology, 2nd Edition, Focal Press Media Technology Professional Series, 2008
- ISBN: 978-0240810843
Tamal Chakraborty, Iti Saha Misra, Ramjee Prasad;?? VoIP Technology: Applications and Challenges,??Springer Series, 2018
- ISBN: 978-3319955933
Endler, David and Collier, Mark, Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions,??McGraw-Hill Osborne Media, 2006
- ISBN: 978-0072263640
Dwivedi, Himanshu, Hacking VoIP: Protocols, Attacks, and Countermeasures,??No Starch Press, 2008
- ISBN: 978-1593271633
Porter, Thomas and Gough, Micaheal, How to Cheat at VoIP Security,??Syngress, 2007
- ISBN:?? 978-1597491693
Porter, Thomas and Kanclirz, Jan and Baskin, Brian, Practical VoIP Security,??Syngress, 2006
- ISBN: 978-1597490603
Gast, Matthew S., 802.11ac?? A Survival Guide, O???Reilly, 2013
- ISBN: 978-1449343149
Flickenger, Rob and Weeks, Roger; Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network , 2nd Edition, O’Reilly, 2005
- ISBN: 978-0596101442
Vladimirov, Andrew A., Wi-Foo ??? The Secrets of Wireless Hacking, Addison Wesley, 2004
- ISBN: 0-321-20217-1
Hurley, Chris and Puchol, Michael and Rogers, Russ; WarDriving: Drive, Detect, Defend, A Guide to Wireless Security,??Syngress, 2004
- ISBN: 978-1931836036
Beaver, Kevin and Davis, Peter T.; Hacking Wireless Networks For Dummies,??For Dummies, 2005
- ISBN: 978-0764597305
Olexa, Ron, Implementing 802.11, 802.16 & 802.20 Wireless Networks, Elsevier Inc., 2005
- ISBN: 0-7506-7808-9
Wright, Joshua and Cache, Johnny; Hacking Exposed Wireless: Wireless Security Secrets & Solutions 3rd Edition, McGraw-Hill Education, 2015
- ISBN: 978-0071827638
Ramachandran, Vivek; BackTrack 5 Wireless Penetration Testing Beginner’s Guide,??Packt Publishing, 2011
- ISBN: 978-1849515580
Vivek Ramachandran, Vivek and Buchanan, Cameron; Kali Linux Wireless Penetration Testing: Beginner’s Guide: Learn to penetrate Wi-Fi and wireless networks to secure your system from vulnerabilities 2nd Edition, Packt Publishing, 2015
- ISBN: 978-1783280414
Oppleman, Victor, Extreme Exploits ??? Advanced Defense Against Hardcore Hacks, McGraw Hill Osborne, 2005
- ISBN: 0-07-225955-8
Rogers, Russ, Devost, Matthew G.; Hacking a Terror Network: The Silent Threat of Covert Channels,??Syngress, 2004
- ASIN: B01JXWCWE2
Harper, Allen Harper and Regalado, Daniel,??Gray Hat Hacking: The Ethical Hacker’s Handbook, 5th Edition, McGraw-Hill Education, 2018
- ISBN: 978-1260108415
Jones, Robert, Internet Forensics, 2006, O Reilly
- ISBN: 0-596-10006-X
Anson, Steve & Bunting, Steve, Mastering Windows Network Forensics and Investigation, Sybex, 2007
- ISBN: 978-0-470-09762-5
Melnichuk, David,??The Hacker’s Underground Handbook: Learn how to hack and what it takes to crack even the most Secure Systems!,??CreateSpace Independent Publishing Platform, 2010
- ISBN: 978-1451550184
Oppleman,??Extreme Exploits – Advanced Defenses Against Hardcore Hacks,??McGraw-Hill Education, 2005
- ISBN: 978-0070607170
W. Singer, P.W. and Friedman, Allan,??Cybersecurity and Cyberwar: What Everyone Needs to Know,??Oxford University Press, 2014
- ISBN: 978-0199918119
Fadia, Ankit, The Unofficial Guide to Ethical Hacking 2nd??Editition,??2006, Thomson
- ISBN: 1-5963-062-8
Bullock, Jessey and Parker, Jeff T. Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework,??Wiley Publishing, 2017
- ISBN: 978-1118918210
Erickson, Jon,??Hacking: The Art of Exploitation,??No Starch Press, 2004
- ISBN: 978-1593270070
Wilhelm, Thomas and Andress, Jason,??Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques,??Syngress, 2010
- ISBN: 978-1597495882
Abhinav Singh, Abhinav and Texeira, Daniel,??Metasploit Penetration Testing Cookbook – Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework 3rd Edition, Packt Publishing, 2018
- ISBN: 978-1788623179
Sammons, John,??The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics 2nd Edition, Syngress, 2014
- ISBN: 978-0128016350
Mandia, Kevin, Incident Response & Computer Forensics 2nd Edition,??2003, McGraw Hill
- ISBN: 0-07-222696-X
Aaron Philipp, Aaron and Cowen, David,??Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions 2nd Edition, McGraw-Hill Education, 2009
- ISBN: 978-0071626774
Patterson, Tom and Blue, Scott Gleeson,??Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy,??Symantec, 2005
- ISBN: 0-321-30452-7
Gregg, Michael, Build Your Own Security Lab, Wiley, 2008
- ISBN: 978-0-470-17986-4
Schneier, Bruce,??Secrets and Lies: Digital Security in a Networked World,??Wiley, 2004
- ISBN: 978-0471453802
Mitchell, Charlie,??Hacked: The Inside Story of America’s Struggle to Secure Cyberspace,??Rowman & Littlefield Publishers, 2016
- ISBN: 978-1442255210
O’Connor, TJ, Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers,??Syngress, 2012
- ISBN: 978-1597499576
Fichera, Joe and Bolt, Steven, Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Respons,??Syngress, 2012
- ISBN: 978-1597499620
Beaver, Kevin, Hacking For Dummies (For Dummies (Computer/tech)) 6th Edition, For Dummies, 2018
- ISBN: 978-1119485476
Hogg, Scott and Vyncke, Eric,??IPv6 Security (Networking Technology: Security),??Cisco Press, 2008
- ISBN: 978-1587055942
Williams, Brandon R.; PCI Compliance, Version 3.2: The Latest on PCI DSS Compliance,??CreateSpace Independent Publishing Platform, 2017
- ISBN: 978-1542364812
Street, Jayson E. and Nabors, Kent,??Dissecting the Hack: The F0rb1dd3n Network, Revised Edition,??Syngress, 2010
- ISBN: 978-1597495684
Clarke, Richard A. and Knake, Robert,??Cyber War: The Next Threat to National Security and What to Do About It,??ECCO, 2010
- ISBN: 978-0061962233
Krebs, Brain, Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door,??Sourcebooks, 2014
- ISBN: 978-1402295614
Mitnick, Kevin,??The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data,??Little, Brown and Company, 2017
- ISBN: 978-0316380508
Neil Bergman, Neil and Stanfield, Mike, Hacking Exposed Mobile: Security Secrets & Solutions, McGraw-Hill Education, 2013
- ISBN: 978-0071817011
Poulsen, Kevin,??Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground,??Crown, 2011
- ISBN: 978-0307588685
Bowden, Mark,??Worm: The First Digital World War,??Atlantic Press Monthly, 2011
- ISBN: 978-0802119834
Zetter, Kim,??Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon,??Crown, 2014
- ISBN: 978-0770436179
Koppel, Ted,??Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath,??Crown, 2015
- ISBN: 978-0553419962
Bunting, Steve,??EnCE ??? The Official EnCase Certified Examiner Study Guide, 2nd Edition, Sybex, 2008
- ISBN: 978-0-470-18145-4
Chappell, Laura, WCNA ??? Official Exam Prep Guide, Chappell University, 2010
- ISBN: 978-1-893939-98-1
Moerschel, Grant, CWSP ??? Certified Wireless Security Professional ??? Official Study Guide, McGraw Hill, 2007
- ISBN: 978-0-07-226320-6
Akin, Deven, CWAP ??? Certified Wireless Analysis Professional ??? Official Study Guide, McGraw Hill, 2004
- ISBN: 0-07225585-4
Standage, Tom,??The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s On-line Pioneers 2nd Edition, Bloomsbury USA, 2014
- ISBN: 978-1620405925
Hiltzik, Michael, Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age,??Harper Business, 2000
- ISBN: 978-0887309892
Seibold, Chris,??Mac Hacks: Tips & Tools for unlocking the power of OS X,??O’Reilly, 2013
- ISBN: 978-1449325589
Stolarz, Damien,??Car PC Hacks,??O???Reilly, 2005
- ISBN: 978-0596008710
Carter, Gerald,??LDAP System Administration: Putting Directories to Work,??O’Reilly, 2003
- ISBN: 978-1565924918
Liu, Cricket and Albitz, Paul,??DNS and BIND 5th Edition, O’Reilly, 2006
- ISBN: 978-0596100575
Liu, Cricket; DNS and BIND on IPv6: DNS for the Next-Generation Internet,??O’Reilly, 2011
- ISBN: 978-1449305192
Droms, Ralph & Lemon, Ted, The DCHP Handbook: Understanding, Managing & Deploying Automated Configuration Services, Bucknell University, 2003
- ISBN: 1-57870-137-6
Rankin, Kyle,??Knoppix Pocket Reference: Troubleshoot, Repair, and Disinfect Both Linux and Windows,??O’Reilly, 2005
- ISBN: 978-0596100759
Rankin, Kyle,??Knoppix Hacks: Tips and Tools for Using the Linux Live CD to Hack, Repair, and Enjoy Your PC 2nd Edition, O’Reilly, 2007
- ISBN: 978-0596514938
Steinberg, Daniel and Cheshire, Stuart,??Zero Configuration Networking: The Definitive Guide,??O’Reilly, 2005
- ISBN: 978-0596101008
Flack, Marjorie and Wiese, Kurt,??The Story about Ping,??Grosset & Dunlap, 2000
- ISBN: 978-0448421650
Ekman, Paul,??Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage,??W.W. Norton & Company, 2009
- ISBN: 978-0393337457
Lyons, Dan,??Disrupted: My Misadventure in the Start-Up Bubble,??Hachette Books, 2017
- ISBN: 978-0316306096
Bradberry, Travis and Greaves, Jean,??Emotional Intelligence 2.0,??TalentSmart, 2009
- ISBN: 978-0974320625
Comer, Douglas E., Computer Networks and Internets, 2nd Edition, Prentice Hall, 1999
- ISBN: 0-13-083617-6
Huiema, Christian, Ipv6 ??? The New Internet Protocol, 2nd Edition, Prentice Hall, 1998
- ISBN: 0-13-850505-5
Cunningham, David & Lane, William G. & Lane, Bill, Gigabit Ethernet Networking, Macmillan Technical, 2003
- ISBN: 1-578-70062-0
Dutcher, Bill, The NAT Handbook: Implementing & Managing Network Address Translation, Wiley, 2000
- ISBN: 0-471-39089-5
Graham, Buck, & Graham, Norman B. TCP/IP Addressing: Designing and Optimizing Your IP Addressing Scheme, Academic Press, 1996
- ISBN: 0-12-294630-8
Hethmon, Paul S. Illustrated Guide to HTTP, Manning, 1997
- ISBN: 0-13-858226-2