Stevens, W. Richard, TCP/IP Illustrated, Volume 1-3, Addison-Wesley, 1994

  • ISBN: 0-201-63346-9

Haugdahl, J. Scott, Network Analysis and Troubleshooting, Addison-Wesley, 2000

  • ISBN: 0-201-43319-2

Charles E. Spurgeon, Joann Zimmerman, Ethernet: The Definitive Guide: Designing and Managing Local Area Networks 2nd Edition, O???Reilly, 2014

  • ISBN: 978-1449361846

Bejtlich, Richard,??The Tao of Network Security Monitoring: Beyond Intrusion Detection, AddisonWesley, 2004

  • ISBN: 978-0321246776

Newton, Harry, Newton???s Telecom Dictionary 31st Edition, CMP Books, 2018

  • ISBN: 978-0979387395

Davidson, Jonathan,??Voice over IP Fundamentals, Cisco Press

  • ISBN: 978-8176355780

Gast, Matthew S., 802.11 Wireless Networks ??? The Definitive Guide, 2nd Edition, O???Reilly, 2005

  • ISBN: 0-596-10052-3

Gast, Matthew S., 802.11n?? A Survival Guide, O???Reilly, 2012

  • ISBN: 978-1449312046

Chappell, Laura, Wireshark Network Analysis 2nd Edition, 2012, Chappell University, 2012

  • ISBN:?? 1-893939-94-4 / 978-1-893939-94-3

Mitnick, Kevin D. The Art of Deception: Controlling the Human Element of Security, Wiley, 2002

  • ISBN: 978-0471237129

Lyon, Gordon ???Fyodor???, NMAP Network Scanning, Insecure.com, LLC, 2008

  • ISBN: 978-0-9799587-1-7

Stoll, Clifford, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday, 1989

  • ISBN: 978-0385249461

Oppenheimer, Priscilla and Bardwell, Joseph, Troubleshooting Campus Networks,??Wiley, 2002

  • ISBN: 0-471-21013-7

Comer, Douglas E., Internetworking with TCP/IP, Volumes 1-5, 3rd Edition, Prentice Hall, 1995

  • ISBN: 0-13-216987-8

Doyle, Jeff and DeHaven, Jennifer, Routing TCP/IP, Volume 1 and 2, 2nd Edition, Cisco Press, 2005

  • ISBN: 978-1587052026

Hafner, Katie and Lyon, Matthew, Where Wizards Stay Up Late ??? The Origins of The Internet, Simon & Schuster, 1996

  • ISBN: 0-684-81201-0

Friedl, Jeffrey E.F., Mastering Regular Expressions 3rd Edition, O’Reilly, 2006

  • ISBN: 978-0596528126

Jaswel, Nipun, Mastering Metasploit: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit, 3rd Edition, Packt Publishing, 2018

  • ISBN: 978-1788990615

Perlman, Radia, Interconnections: Bridges, Routers, Switches & Internetworking Protocols, 2nd Edition, Addison-Wesley, 2000

  • ISBN: 0-201-63448-1

Sanders, Chris, Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems 3rd Edition, No Starch Press, 2017

  • ISBN: 978-1593278021

Chappell, Laura, Wireshark 101: Essential Skills for Network Analysis , Chappell University, 2017

  • ISBN: 978-1893939752

Ahson, Syed A. and Ilysa, Mohammad, VoIP Handbook: Applications, Technologies, Reliability, and Security,??CRC Press, 2008

  • ISBN: 978-1420070200

Minoli, Daniel, Voice Over IPv6: Architectures for Next Generation VoIP Networks, 1st Edition, Newnes Press, 2006

  • ISBN: 978-0750682060

Camarillo, Gonzalo, SIP Demystified,??McGraw-Hill Telecom, 2001

  • ISBN:?? 978-0071373401

Wallingford, Theodore, Switching to VoIP: A Solutions Manual for Network Professionals,??O’Reilly, 2005

  • ISBN: 978-0596008680

Wallingford, Theodore, VoIP Hacks: Tips & Tools for Internet Telephony,??O’Reilly, 2005

  • ISBN: 978-0596101336

Sheppard, Andrew, Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service,??O’Reilly, 2005

  • ISBN: 978-0596101893

Hartpence, Bruce, Packet Guide to Voice over IP: A system administrator’s guide to VoIP technologies,??O’Reilly, 2013

  • ISBN: 978-1449339678

Camp, Ken, IP Telephony Demystified,??McGraw Hill Networking, 2002

  • ISBN: 978-0071406703

Walker, John Q. and Hicks, Jeffrey T., Taking Charge of Your VoIP Project,??Cisco Press, 2004

  • ISBN: 978-1587200922

Swale, Richard and Collins, Daniel, Carrier Grade Voice Over IP, 3rd Edition, McGraw-Hill Education, 2013

  • ISBN: 978-0071827713

Simpson, Wes, Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology, 2nd Edition, Focal Press Media Technology Professional Series, 2008

  • ISBN: 978-0240810843

Tamal Chakraborty, Iti Saha Misra, Ramjee Prasad;?? VoIP Technology: Applications and Challenges,??Springer Series, 2018

  • ISBN: 978-3319955933

Endler, David and Collier, Mark, Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions,??McGraw-Hill Osborne Media, 2006

  • ISBN: 978-0072263640

Dwivedi, Himanshu, Hacking VoIP: Protocols, Attacks, and Countermeasures,??No Starch Press, 2008

  • ISBN: 978-1593271633

Porter, Thomas and Gough, Micaheal, How to Cheat at VoIP Security,??Syngress, 2007

  • ISBN:?? 978-1597491693

Porter, Thomas and Kanclirz, Jan and Baskin, Brian, Practical VoIP Security,??Syngress, 2006

  • ISBN: 978-1597490603

Gast, Matthew S., 802.11ac?? A Survival Guide, O???Reilly, 2013

  • ISBN: 978-1449343149

Flickenger, Rob and Weeks, Roger; Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network , 2nd Edition, O’Reilly, 2005

  • ISBN: 978-0596101442

Vladimirov, Andrew A., Wi-Foo ??? The Secrets of Wireless Hacking, Addison Wesley, 2004

  • ISBN: 0-321-20217-1

Hurley, Chris and Puchol, Michael and Rogers, Russ; WarDriving: Drive, Detect, Defend, A Guide to Wireless Security,??Syngress, 2004

  • ISBN: 978-1931836036

Beaver, Kevin and Davis, Peter T.; Hacking Wireless Networks For Dummies,??For Dummies, 2005

  • ISBN: 978-0764597305

Olexa, Ron, Implementing 802.11, 802.16 & 802.20 Wireless Networks, Elsevier Inc., 2005

  • ISBN: 0-7506-7808-9

Wright, Joshua and Cache, Johnny; Hacking Exposed Wireless: Wireless Security Secrets & Solutions 3rd Edition, McGraw-Hill Education, 2015

  • ISBN: 978-0071827638

Ramachandran, Vivek; BackTrack 5 Wireless Penetration Testing Beginner’s Guide,??Packt Publishing, 2011

  • ISBN: 978-1849515580

Vivek Ramachandran, Vivek and Buchanan, Cameron; Kali Linux Wireless Penetration Testing: Beginner’s Guide: Learn to penetrate Wi-Fi and wireless networks to secure your system from vulnerabilities 2nd Edition, Packt Publishing, 2015

  • ISBN: 978-1783280414

Oppleman, Victor, Extreme Exploits ??? Advanced Defense Against Hardcore Hacks, McGraw Hill Osborne, 2005

  • ISBN: 0-07-225955-8

Rogers, Russ, Devost, Matthew G.; Hacking a Terror Network: The Silent Threat of Covert Channels,??Syngress, 2004

  • ASIN: B01JXWCWE2

Harper, Allen Harper and Regalado, Daniel,??Gray Hat Hacking: The Ethical Hacker’s Handbook, 5th Edition, McGraw-Hill Education, 2018

  • ISBN: 978-1260108415

Jones, Robert, Internet Forensics, 2006, O Reilly

  • ISBN: 0-596-10006-X

Anson, Steve & Bunting, Steve, Mastering Windows Network Forensics and Investigation, Sybex, 2007

  • ISBN: 978-0-470-09762-5

Melnichuk, David,??The Hacker’s Underground Handbook: Learn how to hack and what it takes to crack even the most Secure Systems!,??CreateSpace Independent Publishing Platform, 2010

  • ISBN: 978-1451550184

Oppleman,??Extreme Exploits – Advanced Defenses Against Hardcore Hacks,??McGraw-Hill Education, 2005

  • ISBN: 978-0070607170

W. Singer, P.W. and Friedman, Allan,??Cybersecurity and Cyberwar: What Everyone Needs to Know,??Oxford University Press, 2014

  • ISBN: 978-0199918119

Fadia, Ankit, The Unofficial Guide to Ethical Hacking 2nd??Editition,??2006, Thomson

  • ISBN: 1-5963-062-8

Bullock, Jessey and Parker, Jeff T. Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework,??Wiley Publishing, 2017

  • ISBN: 978-1118918210

Erickson, Jon,??Hacking: The Art of Exploitation,??No Starch Press, 2004

  • ISBN: 978-1593270070

Wilhelm, Thomas and Andress, Jason,??Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques,??Syngress, 2010

  • ISBN: 978-1597495882

Abhinav Singh, Abhinav and Texeira, Daniel,??Metasploit Penetration Testing Cookbook – Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework 3rd Edition, Packt Publishing, 2018

  • ISBN: 978-1788623179

Sammons, John,??The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics 2nd Edition, Syngress, 2014

  • ISBN: 978-0128016350

Mandia, Kevin, Incident Response & Computer Forensics 2nd Edition,??2003, McGraw Hill

  • ISBN: 0-07-222696-X

Aaron Philipp, Aaron and Cowen, David,??Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions 2nd Edition, McGraw-Hill Education, 2009

  • ISBN: 978-0071626774

Patterson, Tom and Blue, Scott Gleeson,??Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy,??Symantec, 2005

  • ISBN: 0-321-30452-7

Gregg, Michael, Build Your Own Security Lab, Wiley, 2008

  • ISBN: 978-0-470-17986-4

Schneier, Bruce,??Secrets and Lies: Digital Security in a Networked World,??Wiley, 2004

  • ISBN: 978-0471453802

Mitchell, Charlie,??Hacked: The Inside Story of America’s Struggle to Secure Cyberspace,??Rowman & Littlefield Publishers, 2016

  • ISBN: 978-1442255210

O’Connor, TJ, Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers,??Syngress, 2012

  • ISBN: 978-1597499576

Fichera, Joe and Bolt, Steven, Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Respons,??Syngress, 2012

  • ISBN: 978-1597499620

Beaver, Kevin, Hacking For Dummies (For Dummies (Computer/tech)) 6th Edition, For Dummies, 2018

  • ISBN: 978-1119485476

Hogg, Scott and Vyncke, Eric,??IPv6 Security (Networking Technology: Security),??Cisco Press, 2008

  • ISBN: 978-1587055942

Williams, Brandon R.; PCI Compliance, Version 3.2: The Latest on PCI DSS Compliance,??CreateSpace Independent Publishing Platform, 2017

  • ISBN: 978-1542364812

Street, Jayson E. and Nabors, Kent,??Dissecting the Hack: The F0rb1dd3n Network, Revised Edition,??Syngress, 2010

  • ISBN: 978-1597495684

Clarke, Richard A. and Knake, Robert,??Cyber War: The Next Threat to National Security and What to Do About It,??ECCO, 2010

  • ISBN: 978-0061962233

Krebs, Brain, Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door,??Sourcebooks, 2014

  • ISBN: 978-1402295614

Mitnick, Kevin,??The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data,??Little, Brown and Company, 2017

  • ISBN: 978-0316380508

Neil Bergman, Neil and Stanfield, Mike, Hacking Exposed Mobile: Security Secrets & Solutions, McGraw-Hill Education, 2013

  • ISBN: 978-0071817011

Poulsen, Kevin,??Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground,??Crown, 2011

  • ISBN: 978-0307588685

Bowden, Mark,??Worm: The First Digital World War,??Atlantic Press Monthly, 2011

  • ISBN: 978-0802119834

Zetter, Kim,??Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon,??Crown, 2014

  • ISBN: 978-0770436179

Koppel, Ted,??Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath,??Crown, 2015

  • ISBN: 978-0553419962

Bunting, Steve,??EnCE ??? The Official EnCase Certified Examiner Study Guide, 2nd Edition, Sybex, 2008

  • ISBN: 978-0-470-18145-4

Chappell, Laura, WCNA ??? Official Exam Prep Guide, Chappell University, 2010

  • ISBN: 978-1-893939-98-1

Moerschel, Grant, CWSP ??? Certified Wireless Security Professional ??? Official Study Guide, McGraw Hill, 2007

  • ISBN: 978-0-07-226320-6

Akin, Deven, CWAP ??? Certified Wireless Analysis Professional ??? Official Study Guide, McGraw Hill, 2004

  • ISBN: 0-07225585-4

Standage, Tom,??The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s On-line Pioneers 2nd Edition, Bloomsbury USA, 2014

  • ISBN: 978-1620405925

Hiltzik, Michael, Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age,??Harper Business, 2000

  • ISBN: 978-0887309892

Seibold, Chris,??Mac Hacks: Tips & Tools for unlocking the power of OS X,??O’Reilly, 2013

  • ISBN: 978-1449325589

Stolarz, Damien,??Car PC Hacks,??O???Reilly, 2005

  • ISBN: 978-0596008710

Carter, Gerald,??LDAP System Administration: Putting Directories to Work,??O’Reilly, 2003

  • ISBN: 978-1565924918

Liu, Cricket and Albitz, Paul,??DNS and BIND 5th Edition, O’Reilly, 2006

  • ISBN: 978-0596100575

Liu, Cricket; DNS and BIND on IPv6: DNS for the Next-Generation Internet,??O’Reilly, 2011

  • ISBN: 978-1449305192

Droms, Ralph & Lemon, Ted, The DCHP Handbook: Understanding, Managing & Deploying Automated Configuration Services, Bucknell University, 2003

  • ISBN: 1-57870-137-6

Rankin, Kyle,??Knoppix Pocket Reference: Troubleshoot, Repair, and Disinfect Both Linux and Windows,??O’Reilly, 2005

  • ISBN: 978-0596100759

Rankin, Kyle,??Knoppix Hacks: Tips and Tools for Using the Linux Live CD to Hack, Repair, and Enjoy Your PC 2nd Edition, O’Reilly, 2007

  • ISBN: 978-0596514938

Steinberg, Daniel and Cheshire, Stuart,??Zero Configuration Networking: The Definitive Guide,??O’Reilly, 2005

  • ISBN: 978-0596101008

Flack, Marjorie and Wiese, Kurt,??The Story about Ping,??Grosset & Dunlap, 2000

  • ISBN: 978-0448421650

Ekman, Paul,??Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage,??W.W. Norton & Company, 2009

  • ISBN: 978-0393337457

Lyons, Dan,??Disrupted: My Misadventure in the Start-Up Bubble,??Hachette Books, 2017

  • ISBN: 978-0316306096

Bradberry, Travis and Greaves, Jean,??Emotional Intelligence 2.0,??TalentSmart, 2009

  • ISBN: 978-0974320625

Comer, Douglas E., Computer Networks and Internets, 2nd Edition, Prentice Hall, 1999

  • ISBN: 0-13-083617-6

Huiema, Christian, Ipv6 ??? The New Internet Protocol, 2nd Edition, Prentice Hall, 1998

  • ISBN: 0-13-850505-5

Cunningham, David & Lane, William G. & Lane, Bill, Gigabit Ethernet Networking, Macmillan Technical, 2003

  • ISBN: 1-578-70062-0

Dutcher, Bill, The NAT Handbook: Implementing & Managing Network Address Translation, Wiley, 2000

  • ISBN: 0-471-39089-5

Graham, Buck, & Graham, Norman B. TCP/IP Addressing: Designing and Optimizing Your IP Addressing Scheme, Academic Press, 1996

  • ISBN: 0-12-294630-8

Hethmon, Paul S. Illustrated Guide to HTTP, Manning, 1997

  • ISBN: 0-13-858226-2