https://www.developerfusion.com/t/security/books/view/recommended/ Recommended Security Book from Developer Fusion 2011-12-14T15:46:00.00Z http://www.developerfusion.com/book/134610/the-tangled-web-a-guide-to-securing-modern-web-applications/ The Tangled Web: A Guide to Securing Modern Web Applications 2011-12-14T15:46:00.00Z "Thorough and comprehensive coverage from one of the foremost experts in browser security."--Tavis Ormandy, Google Inc.Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. James Crowley http://www.developerfusion.com/book/134575/comptia-security-get-certified-get-ahead-sy0301-study-guide/ CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide 2011-12-13T04:56:00.00Z CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide is an update to the top-selling SY0-201 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version.Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. James Crowley http://www.developerfusion.com/book/122048/metasploit-a-penetration-testers-guide/ Metasploit: A Penetration Tester's Guide 2011-07-11T16:07:00.00Z The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. James Crowley http://www.developerfusion.com/book/130311/android-forensics-investigation-analysis-and-mobile-security-for-google-android/ Android Forensics: Investigation, Analysis and Mobile Security for Google Android 2011-10-14T04:21:00.00Z The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. James Crowley http://www.developerfusion.com/book/117952/backtrack-4-assuring-security-by-penetration-testing/ BackTrack 4: Assuring Security by Penetration Testing 2011-04-16T22:50:00.00Z Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. James Crowley http://www.developerfusion.com/book/94194/gray-hat-hacking-the-ethical-hackers-handbook-3rd-edition/ Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition 2011-02-01T12:33:00.00Z THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. James Crowley http://www.developerfusion.com/book/94264/web-application-obfuscation-wafsevasionfiltersalertobfuscation/ Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation 2011-02-01T15:04:00.00Z Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. James Crowley http://www.developerfusion.com/book/122478/mcts-70680-cert-guide-microsoft-windows-7-configuring/ MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring 2011-07-18T20:02:00.00Z *Master every topic on Microsoft’s new MCTS 70-680 exam. *Assess your knowledge and focus your learning. *Get the practical workplace knowledge you need!Start-to-finish MCTS 70-680 preparation from top Microsoft technology consultant, trainer, and author Don Poulton!Master every MCTS 70-680 topic! *Windows 7 installation, upgrades, and deployment *User and application migration *Windows 7 deployment James Crowley http://www.developerfusion.com/book/94282/vmware-esxi-planning-implementation-and-security/ VMware ESXi: Planning, Implementation, and Security 2011-02-01T16:34:00.00Z VMware ESXi is the easiest way to get started with virtualization -- and it's free. It allows administrators to consolidate their applications onto fewer servers and start saving money through reduced hardware, power, cooling, and administration costs. VMware ESXi has been optimized and tested to run even their most resource-intensive applications and databases with minimal performance overhead. James Crowley http://www.developerfusion.com/book/94220/malware-analysts-cookbook-and-dvd-tools-and-techniques-for-fighting-malicious-code/ Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code 2011-02-01T12:59:00.00Z A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. James Crowley