Os livros listados abaixo são alguns exemplos de literatura sobre segurança da informação. Existem vários outros títulos sobre esse assunto que são tão bons quanto estes.
O CSIRT Unicamp não está fazendo propaganda ou endossando a favor dessas literaturas.
___________________________________________________________________________
Título: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Autores: Michael Howard, John Viega, David LeBlanc
Editora: McGraw-Hill Osborne Media; 1 edition (September 3, 2009)
ISBN-10: 0071626751
ISBN-13: 978-0071626750
___________________________________________________________________________
Título: Art of Computer Virus Research and Defense- The
Autor: Peter Szor
Editora: Addison-Wesley Professional (February 13, 2005)
ISBN-10: 0321304543
ISBN-13: 978-0321304544
___________________________________________________________________________
Título: Assembly Language for Intel-based Computers
Autor: Kip R. Irvine
Editora: Prentice Hall; 6 edition (March 7, 2010)
ISBN-10: 013602212X
ISBN-13: 978-0136022121
___________________________________________________________________________
Título: Book of PF- The
Autor: Peter N. M. Hansteen
Editora: No Starch Press; Second Edition edition (November 19, 2010)
ISBN-10: 159327274X
ISBN-13: 978-1593272746
___________________________________________________________________________
Título: Building Secure Software: : How to Avoid Security Problems the Right Way (paperback)
Autores: John Viega, Gary McGraw
Editora: Addison-Wesley Professional; 1 edition (October 4, 2001)
ISBN-10: 0321774957
ISBN-13: 978-0321774958
___________________________________________________________________________
Título: CERT Resilience Management Model (CERT-RMM): A Maturity Model for Managing Operational Resilience
Autores: Julia H. Allen, David Warren White, Richard A. Caralli
Editora: Addison-Wesley Professional; 1 edition (December 4, 2010)
ISBN-10: 0321712439
ISBN-13: 978-0321712431
___________________________________________________________________________
Título: Cryptography Engineering
Autores: Bruce Schneier, Niels Ferguson, Tadayoshi Kohno
Editora: Wiley; 1 edition (March 15, 2010)
ISBN-10: 0470474246
ISBN-13: 978-0470474242
___________________________________________________________________________
Título: Exploiting online games: Cheating Massively Distributed Systems
Autores: Gary McGraw, Greg Hoglund
Editora: Addison-Wesley Professional; 1 edition (July 19, 2007)
ISBN-10: 0132271915
ISBN-13: 978-0132271912
___________________________________________________________________________
Título: Exploiting Software
Autores: Gary McGraw e Greg Hoglund
Editora: Addison-Wesley Professional; 1 edition (February 27, 2004)
ISBN-10: 0201786958
ISBN-13: 978-0201786958
___________________________________________________________________________
Título: Extrusion Detection: Security Monitoring for Internal Intrusions
Autor: Richard Bejtlich
Editora: Addison-Wesley Professional (November 18, 2005)
ISBN-10: 0321349962
ISBN-13: 978-0321349965
___________________________________________________________________________
Título: Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Autor: Jonathan Zdziarski
Editora: O’Reilly Media; 1 edition (January 25, 2012)
ISBN-10: 1449318746
ISBN-13: 978-1449318741
___________________________________________________________________________
Título: Internet Denial of Service: Attack and Defense Mechanisms
Autores: Jelena Mirkovic, Peter Reiher, Sven Dietrich, David Dittrich
Editora: Prentice Hall (January 9, 2005)
ISBN-10: 0131475738
ISBN-13: 978-0131475731
___________________________________________________________________________
Título: Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Autores: Anton Chuvakin, Kevin Schmidt
Editora: Syngress; 1 edition (December 13, 2012)
ISBN-10: 1597496359
ISBN-13: 978-1597496353
___________________________________________________________________________
Título: Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Autores: Blake Hartstein, Matthew Richard, Michael Ligh, Steven Adair
Editora: Wiley; 1 edition (November 2, 2010)
ISBN-10: 0470613033
ISBN-13: 978-0470613030
___________________________________________________________________________
Título: Malware Forensics: Investigating and Analyzing Malicious Code
Autores: Cameron H. Malin, Eoghan Casey, James M. Aquilina
Editora: Syngress; 1 edition (June 30, 2008)
ISBN-10: 159749268X
ISBN-13: 978-1597492683
___________________________________________________________________________
Título: Network Flow Analysis
Autor: Michael W. Lucas
Editora: No Starch Press; 1 edition (July 5, 2010)
ISBN-10: 1593272030
ISBN-13: 978-1593272036
___________________________________________________________________________
Título: Practical cryptography
Autores: Bruce Schneier, Niels Ferguson
Editora: Wiley; 1 edition (March 28, 2003)
ISBN-10: 0471223573
ISBN-13: 978-0471223573
___________________________________________________________________________
Título: Practice of Network Security Monitoring: Understanding Incident Detection and Response- The
Autor: Richard Bejtlich
Editora: No Starch Press; 1 edition (August 2, 2013)
ISBN-10: 1593275099
ISBN-13: 978-1593275099
___________________________________________________________________________
Título: Programmer’s Ultimate Security DeskRef: Your programming security encyclopedia
Autor: James C Foster
Editora: Syngress; 1 edition (December 4, 2004)
ISBN-10: 1932266720
ISBN-13: 78-1932266726
___________________________________________________________________________
Título: Reverse Engineering Code with IDA Pro
Autor: Walter Pearce
Editora: Syngress; 1st edition (April 18, 2011)
ISBN-10: 159749237X
ISBN-13: 978-1597492379
___________________________________________________________________________
Título: Reversing: Secrets of Reverse Engineering
Autor: Eldad Eilam
Editora: Wiley; 1 edition (April 15, 2005)
ISBN-10: 0764574817
ISBN-13: 978-0764574818
___________________________________________________________________________
Título: Secure coding in C and C++
Autor: Robert C. Seacord
Editora: Addison-Wesley Professional; 2 edition (April 12, 2013)
ISBN-10: 0321822137
ISBN-13: 978-0321822130
___________________________________________________________________________
Título: Secure Coding: Principles and Practices
Autores: Mark G. Graff, Kenneth R. van Wyk
Editora: O’Reilly Media; 1st edition (July 2003)
ISBN-10: 0596002424
ISBN-13: 978-0596002428
___________________________________________________________________________
Título: Secure Programming With Static Analysis
Autores: Brian Chess, Jacob West
Editora: Addison-Wesley Professional (July 9, 2007)
ISBN-10: 0321424778
ISBN-13: 978-0321424778
___________________________________________________________________________
Título: Security Warrior
Autores: Anton Chuvakin, Cyrus Peikari
Editora: O’Reilly Media; 1st edition (February 1, 2004)
ISBN-10: 0596005458
ISBN-13: 978-0596005450
___________________________________________________________________________
Título: SQL Injection Attacks And Defense
Autor: Justin Clarke
Editora: Syngress; 2 edition (July 2, 2012)
ISBN-10: 1597499633
ISBN-13: 978-1597499637
___________________________________________________________________________
Título: Software Security Engineering: A Guide for Project Managers
Autores: Julia H. Allen, Sean J. Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead
Editora: Addison-Wesley Professional; 1 edition (May 11, 2008)
ISBN-10: 032150917X
ISBN-13: 978-0321509178
___________________________________________________________________________
Título: Software Security
Autor: Gary McGraw
Editora: Addison-Wesley Professional; 1 edition (February 2, 2006)
ISBN-10: 0321356705
ISBN-13: 978-0321356703
___________________________________________________________________________
Título: Tao of network security monitoring- The
Autor: Richard Bejtlich
Publisher: Addison-Wesley Professional; 1 edition (July 22, 2004)
ISBN-10: 0321246772
ISBN-13: 978-0321246776
___________________________________________________________________________
Título: Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Autores: Niels Provos, Thorsten Holz
Editora: Addison-Wesley Professional; 1 edition (July 26, 2007)
ISBN-10: 0321336321
ISBN-13: 978-0321336323
___________________________________________________________________________
Título: Web Application Obfuscation
Autores: Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes e David Lindsay
Editora: Syngress; 1 edition (December 10, 2010)
ISBN-10: 1597496049
ISBN-13: 978-1597496049
___________________________________________________________________________
Título: Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws – The
Autores: Dafydd Stuttard, Marcus Pinto
Editora: Wiley; 2 edition (September 27, 2011)
ISBN-10: 1118026470
ISBN-13: 978-1118026472
___________________________________________________________________________
Título: Web Security Testing Cookbook
Autores: Ben Walther, Paco Hope
Editora: O’Reilly Media; 1 edition (October 24, 2008)
ISBN-10: 0596514832
ISBN-13: 978-0596514839
___________________________________________________________________________
Título: Security Warrior
Autores: Anton Chuvakin, Cyrus Peikari
Editora: O’Reilly Media; 1st edition (February 1, 2004)
ISBN-10: 0596005458
ISBN-13: 978-0596005450
___________________________________________________________________________