Reading list for studying for the CISSP
Do you have, or know where I could locate, an educational track
of sorts, or a syllabus, to guide me in my pursuit of a security certification?
Here's a reading list I pulled together for the CISSP:
CISSP Examination Textbooks: Theory and Practice, 2nd Ed., SRV
Professional Publications
Secured Computing: A Cissp Study Guide, Carl F. Endorf
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, Ronald L. Krutz, Russell Dean Vines, Edward M. Stroz
All-in-One CISSP Exam Guide, Shon Harris
Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd
Ed., Bruce Schneier
Secrets and Lies: Digital Security in a Networked World, Bruce Schneier
The Process of Network Security, Thomas A. Wadlow
Kerberos: A Network Authentication System, Brian Tung
Practical Intrusion Detection Handbook, Paul E. Proctor
Network Intrusion Detection: An Analyst's Handbook, Stephen Northcutt, et al
Intrusion Signatures and Analysis, Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick
Intrusion Detection, Rebecca Gurley Bace
Security, ID Systems and Locks: The Book on Electronic Access Control, Joel Konicek, Karen Little
Building Internet Firewalls, 2nd Ed., Elizabeth D. Zwicky, Simon
Cooper, D. Brent Chapman, Deborah Russell
The Information Systems Security Officer's Guide: Establishing and Managing
an Information Protection Program, Gerald Kovacich
Fighting Computer Crime: A New Framework for Protecting Information, Donn B. Parker
ISP Liability Survival Guide: Strategies for Managing Copyright, Spam,
Cache and Privacy Regulations, Timothy D. Casey
Information Security Policies Made Easy (Version #8), Charles Cresson Wood
Practical Unix and Internet Security, Simson Garfinkel, Gene Spafford
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server
and Workstation
Information Security Management Handbook 2001, Harold F. Tipton (Editor), Micki Krause (Editor)
The CERT(R) Guide to System and Network Security Practices, Julia H. Allen
Incident Response: Investigating Computer Crime, Chris Prosise, Kevin Mandia
Computer Forensics, Warren G. Kruse II, Jay G. Heiser
Know Your Enemy: Revealing the Security Tools, Tactics and Motives of the
Blackhat Community, The Honeynet Project, Bruce Schneier
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective
Defenses, Ed Skoudis
Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks and Spies over Time, John Chirillo
Hack Attacks Denied: Complete Guide to Network LockDown, John Chirillo
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking
Toolkit, John Chirillo
Hacker's Challenge, Mike Schiffman
Hackers Beware, Eric Cole
White-Hat Security Arsenal: Tackling the Threats, Aviel D. Rubin
Handbook of Computer Crime Investigation: Forensic Tools & Technology, Eoghan Casey
Cyber Forensics: A Field Manual for Collecting, Examining and Preserving
Evidence of Computer Crimes, Albert J. Marcella Jr (Editor), Robert S.
Greenfield
Information Security Policies, Procedures and Standards: Guidelines for
Effective Information Security Management, Thomas R. Peltier
Writing Information Security Policies, Scott Barman
Building an Information Security Awareness Program, Mark B. Desman
Information Security Architecture: An Integrated Approach to Security in the Organization, Jan Killmeyer Tudor
Information Security Risk Analysis, Thomas R. Peltier
Rethinking Public Key Infrastructures and Digital Certificates, Stefan A. Brands
Intrusion Signatures and Analysis, Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick
Hacking Exposed, 3rd Ed., Joel Scambray, et al
This was first published in March 2002
Join the conversationComment
Share
Comments
Results
Contribute to the conversation