Reading List

Hacking: the Art of Exploitation

Jon Erickson

Publisher: No Starch Press; 2nd edition (24th December 2007)
ISBN-10: 1593271441
ISBN-13: 978-1593271441

TCP/IP Illustrated, Volume 1: The Protocols

W. Richard Stevens

Publisher: Addison Wesley (1st Feb 1994)
ISBN-10: 0201633469
ISBN-13: 978-0201633467

Security Power Tools

Bryan Burns, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni and Philippe Biondi

Publisher: O'Reilly Media, Inc. (27th August 2007)
ISBN-10: 0596009631
ISBN-13: 978-0596009632

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Justin Seitz

Publisher: No Starch Press (23rd April 2009)
ISBN-10: 1593271921
ISBN-13: 978-1593271923

File System Forensic Analysis

Brian Carrier

Publisher: Addison-Wesley Professional (27th March 2005)
ISBN-10: 0321268172
ISBN-13: 978-0321268174

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Bill Blunden

Publisher: Jones & Bartlett Publishers (4th May 2009)
ISBN-10: 1598220616
ISBN-13: 978-1598220612

Windows Internals: Covering Windows Server 2008 and Windows Vista

Mark Russinovich, David A. Solomon and Alex Ionescu

Publisher: Microsoft Press; 5th Edition (17th June 2009)
ISBN-10: 0735625301
ISBN-13: 978-0735625301

Core Python Programming

Wesley Chun

Publisher: Prentice Hall PTR; 2nd edition (28th September 2006)
ISBN-10: 0132269937
ISBN-13: 978-0132269933