Livros sobre segurança da informação

 
Os livros listados abaixo são alguns exemplos de literatura sobre segurança da informação. Existem vários outros títulos sobre esse assunto que são tão bons quanto estes.

O CSIRT Unicamp não está fazendo propaganda ou endossando a favor dessas literaturas.

___________________________________________________________________________

Título: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Autores: Michael Howard, John Viega, David LeBlanc

Editora: McGraw-Hill Osborne Media; 1 edition (September 3, 2009)
ISBN-10: 0071626751
ISBN-13: 978-0071626750
___________________________________________________________________________

Título: Art of Computer Virus Research and Defense- The
Autor: Peter Szor

Editora: Addison-Wesley Professional (February 13, 2005)
ISBN-10: 0321304543
ISBN-13: 978-0321304544
___________________________________________________________________________

Título: Assembly Language for Intel-based Computers
Autor: Kip R. Irvine

Editora: Prentice Hall; 6 edition (March 7, 2010)
ISBN-10: 013602212X
ISBN-13: 978-0136022121
___________________________________________________________________________

Título: Book of PF- The
Autor: Peter N. M. Hansteen

Editora: No Starch Press; Second Edition edition (November 19, 2010)
ISBN-10: 159327274X
ISBN-13: 978-1593272746
___________________________________________________________________________

Título: Building Secure Software: : How to Avoid Security Problems the Right Way (paperback)
Autores: John Viega, Gary McGraw

Editora: Addison-Wesley Professional; 1 edition (October 4, 2001)
ISBN-10: 0321774957
ISBN-13: 978-0321774958
___________________________________________________________________________

Título: CERT Resilience Management Model (CERT-RMM): A Maturity Model for Managing Operational Resilience
Autores: Julia H. Allen, David Warren White, Richard A. Caralli

Editora: Addison-Wesley Professional; 1 edition (December 4, 2010)
ISBN-10: 0321712439
ISBN-13: 978-0321712431
___________________________________________________________________________

Título: Cryptography Engineering
Autores: Bruce Schneier, Niels Ferguson, Tadayoshi Kohno

Editora: Wiley; 1 edition (March 15, 2010)
ISBN-10: 0470474246
ISBN-13: 978-0470474242
___________________________________________________________________________

Título: Exploiting online games: Cheating Massively Distributed Systems
Autores: Gary McGraw, Greg Hoglund

Editora: Addison-Wesley Professional; 1 edition (July 19, 2007)
ISBN-10: 0132271915
ISBN-13: 978-0132271912
___________________________________________________________________________

Título: Exploiting Software
Autores: Gary McGraw e Greg Hoglund

Editora: Addison-Wesley Professional; 1 edition (February 27, 2004)
ISBN-10: 0201786958
ISBN-13: 978-0201786958
___________________________________________________________________________

Título: Extrusion Detection: Security Monitoring for Internal Intrusions
Autor: Richard Bejtlich

Editora: Addison-Wesley Professional (November 18, 2005)
ISBN-10: 0321349962
ISBN-13: 978-0321349965
___________________________________________________________________________

Título: Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Autor: Jonathan Zdziarski

Editora: O’Reilly Media; 1 edition (January 25, 2012)
ISBN-10: 1449318746
ISBN-13: 978-1449318741
___________________________________________________________________________

Título: Internet Denial of Service: Attack and Defense Mechanisms
Autores: Jelena Mirkovic, Peter Reiher, Sven Dietrich, David Dittrich

Editora: Prentice Hall (January 9, 2005)
ISBN-10: 0131475738
ISBN-13: 978-0131475731
___________________________________________________________________________

Título: Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Autores: Anton Chuvakin, Kevin Schmidt

Editora: Syngress; 1 edition (December 13, 2012)
ISBN-10: 1597496359
ISBN-13: 978-1597496353
___________________________________________________________________________

Título: Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Autores: Blake Hartstein, Matthew Richard, Michael Ligh, Steven Adair

Editora: Wiley; 1 edition (November 2, 2010)
ISBN-10: 0470613033
ISBN-13: 978-0470613030
___________________________________________________________________________

Título: Malware Forensics: Investigating and Analyzing Malicious Code
Autores: Cameron H. Malin, Eoghan Casey, James M. Aquilina

Editora: Syngress; 1 edition (June 30, 2008)
ISBN-10: 159749268X
ISBN-13: 978-1597492683
___________________________________________________________________________

Título: Network Flow Analysis
Autor: Michael W. Lucas

Editora: No Starch Press; 1 edition (July 5, 2010)
ISBN-10: 1593272030
ISBN-13: 978-1593272036
___________________________________________________________________________

Título: Practical cryptography
Autores: Bruce Schneier, Niels Ferguson

Editora: Wiley; 1 edition (March 28, 2003)
ISBN-10: 0471223573
ISBN-13: 978-0471223573
___________________________________________________________________________

Título: Practice of Network Security Monitoring: Understanding Incident Detection and Response- The
Autor: Richard Bejtlich

Editora: No Starch Press; 1 edition (August 2, 2013)
ISBN-10: 1593275099
ISBN-13: 978-1593275099
___________________________________________________________________________

Título: Programmer’s Ultimate Security DeskRef: Your programming security encyclopedia
Autor: James C Foster

Editora: Syngress; 1 edition (December 4, 2004)
ISBN-10: 1932266720
ISBN-13: 78-1932266726
___________________________________________________________________________

Título: Reverse Engineering Code with IDA Pro
Autor: Walter Pearce

Editora: Syngress; 1st edition (April 18, 2011)
ISBN-10: 159749237X
ISBN-13: 978-1597492379
___________________________________________________________________________

Título: Reversing: Secrets of Reverse Engineering
Autor: Eldad Eilam

Editora: Wiley; 1 edition (April 15, 2005)
ISBN-10: 0764574817
ISBN-13: 978-0764574818
___________________________________________________________________________

Título: Secure coding in C and C++
Autor: Robert C. Seacord

Editora: Addison-Wesley Professional; 2 edition (April 12, 2013)
ISBN-10: 0321822137
ISBN-13: 978-0321822130
___________________________________________________________________________

Título: Secure Coding: Principles and Practices
Autores: Mark G. Graff, Kenneth R. van Wyk

Editora: O’Reilly Media; 1st edition (July 2003)
ISBN-10: 0596002424
ISBN-13: 978-0596002428
___________________________________________________________________________

Título: Secure Programming With Static Analysis
Autores: Brian Chess, Jacob West

Editora: Addison-Wesley Professional (July 9, 2007)
ISBN-10: 0321424778
ISBN-13: 978-0321424778
___________________________________________________________________________

Título: Security Warrior
Autores: Anton Chuvakin, Cyrus Peikari

Editora: O’Reilly Media; 1st edition (February 1, 2004)
ISBN-10: 0596005458
ISBN-13: 978-0596005450
___________________________________________________________________________

Título: SQL Injection Attacks And Defense
Autor: Justin Clarke

Editora: Syngress; 2 edition (July 2, 2012)
ISBN-10: 1597499633
ISBN-13: 978-1597499637
___________________________________________________________________________

Título: Software Security Engineering: A Guide for Project Managers
Autores: Julia H. Allen, Sean J. Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead

Editora: Addison-Wesley Professional; 1 edition (May 11, 2008)
ISBN-10: 032150917X
ISBN-13: 978-0321509178
___________________________________________________________________________

Título: Software Security
Autor: Gary McGraw

Editora: Addison-Wesley Professional; 1 edition (February 2, 2006)
ISBN-10: 0321356705
ISBN-13: 978-0321356703
___________________________________________________________________________

Título: Tao of network security monitoring- The
Autor: Richard Bejtlich

Publisher: Addison-Wesley Professional; 1 edition (July 22, 2004)
ISBN-10: 0321246772
ISBN-13: 978-0321246776
___________________________________________________________________________

Título: Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Autores: Niels Provos, Thorsten Holz

Editora: Addison-Wesley Professional; 1 edition (July 26, 2007)
ISBN-10: 0321336321
ISBN-13: 978-0321336323
___________________________________________________________________________

Título: Web Application Obfuscation
Autores: Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes e David Lindsay

Editora: Syngress; 1 edition (December 10, 2010)
ISBN-10: 1597496049
ISBN-13: 978-1597496049
___________________________________________________________________________

Título: Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws – The
Autores: Dafydd Stuttard, Marcus Pinto

Editora: Wiley; 2 edition (September 27, 2011)
ISBN-10: 1118026470
ISBN-13: 978-1118026472
___________________________________________________________________________

Título: Web Security Testing Cookbook
Autores: Ben Walther, Paco Hope

Editora: O’Reilly Media; 1 edition (October 24, 2008)
ISBN-10: 0596514832
ISBN-13: 978-0596514839
___________________________________________________________________________

Título: Security Warrior
Autores: Anton Chuvakin, Cyrus Peikari

Editora: O’Reilly Media; 1st edition (February 1, 2004)
ISBN-10: 0596005458
ISBN-13: 978-0596005450
___________________________________________________________________________