Last active
February 11, 2025 10:47
Revisions
-
technmsg revised this gist
Sep 7, 2015 . 1 changed file with 44 additions and 4 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,16 +1,56 @@ A selection of computer textbooks, ranging the gamut from system administration to low-level hardware to cyber security management. All in excellent condition, some never opened. Free to a good home if you'll cover shipping, although *some* of them are old enough that they'd be cheaper to order from Amazon directly. Unclaimed books will be donated to [The Book Thing of Baltimore](http://www.bookthing.org/). ## Computer Hardware * White. How Computers Work (Millenium Edition) * Rosch. [Winn L. Rosch Hardware Bible](http://www.amazon.com/gp/product/0789717433/?tag=alexmp-20) (5th Edition) ## Computer Programming * Roberts. [Director 7 Demystified: The Official Guide to Macromedia Director, Lingo, and Shockwave](http://www.amazon.com/gp/product/0201354454/?tag=alexmp-20) * Harringer. [Introduction to Computer Programming with Visual Basic 6](http://www.amazon.com/gp/product/1580762417/?tag=alexmp-20) (1st Edition) ## Computer Security * Parker. [Fighting Computer Crime: A New Framework for Protecting Information](http://www.amazon.com/gp/product/0471163783/?tag=alexmp-20) * Crume. [Inside Internet Security: What Hackers Don't Want You To Know](http://www.amazon.com/gp/product/0201675161/?tag=alexmp-20) (1st Edition) * Bishop. [Introduction to Computer Security](http://www.amazon.com/gp/product/0321247442/?tag=alexmp-20) (1st Edition) * ~~Security Engineering: A Guide to Building Dependable Distributed Systems~~ * ~~Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)~~ * ~~Cryptography Engineering: Design Principles and Practical Applications~~ * ~~Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition~~ * ~~Metasploit: The Penetration Tester's Guide~~ * ~~Guide to Computer Forensics and Investigations (Book & CD), 4th Edition~~ * Klein. [A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security](http://www.amazon.com/gp/product/1593273851/?tag=alexmp-20) * ~~Introduction to Modern Cryptography: Principles and Protocols~~ * ~~Cryptography Engineering: Design Principles and Practical Applications~~ * ~~Network Security: Current Status and Future Directions~~ * Whitman. [Management of Information Security](http://www.amazon.com/gp/product/1435488849/?tag=alexmp-20) (3rd Edition) * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~ ## Networking * Hecht. Understanding Fiber Options. (1st Edition) * Black. [IP Routing Protocols: RIP, OSPF, BGP, PNNI and Cisco Routing Protocols](http://www.amazon.com/gp/product/0130142484/?tag=alexmp-20) * Oppenheimer. [Top-Down Network Design](http://www.amazon.com/gp/product/1578700698/?tag=alexmp-20) (1st Edition) * Stallings. Data and Computer Communications (4th Edition) * Odom. [CCNA INTRO Exam Certification Guide](http://www.amazon.com/gp/product/1587200945/?tag=alexmp-20) (CCNA Self-Study, 640-821, 640-801) * Odom. [CCNA ICND Exam Certification Guide](http://www.amazon.com/gp/product/158720083X/?tag=alexmp-20) (CCNA Self-Study, 640-811, 640-801) * [Cisco CCNA Network Simulator](http://www.amazon.com/gp/product/1587201313/?tag=alexmp-20) (CCNA Self-Study, 640-801) * Kurose. [Computer Networking: A Top-Down Approach](http://www.amazon.com/gp/product/0136079679/?tag=alexmp-20) (5th Edition) ## System Administration * Nemeth, et al. [UNIX System Administration Handbook](http://www.amazon.com/gp/product/0130206016/?tag=alexmp-20) (3rd Edition) * Linux Administration: A Beginners Guide (2nd Edition) * Harvel et al. [The UNIX and Windows 2000 Handbook: Planning, Integration and Administration](http://www.amazon.com/gp/product/0130254932/?tag=alexmp-20) (1st Edition) * Shinder. [Managing Windows 2000 Network Services](http://www.amazon.com/gp/product/1928994067/?tag=alexmp-20) * Stallings. [Operating Systems: Internals and Design Principles](http://www.amazon.com/gp/product/0136006329/?tag=alexmp-20) (6th Edition) If you're interested, drop me a line via email or [Twitter](https://twitter.com/technmsg/status/640163944729047040). Note: GitHub doesn't currently provide notifications of Gist comments (ref [1](https://gist.github.com/maxogden/3422419) [2](https://github.com/isaacs/github/issues/21)). -
technmsg revised this gist
Sep 5, 2015 . 1 changed file with 9 additions and 9 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,15 +1,15 @@ A selection of computer security textbooks. All in excellent condition, some never opened. Free to a good home if you'll cover shipping. * ~~Security Engineering: A Guide to Building Dependable Distributed Systems~~ * ~~Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)~~ * ~~Cryptography Engineering: Design Principles and Practical Applications~~ * ~~Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition~~ * ~~Metasploit: The Penetration Tester's Guide~~ * ~~Guide to Computer Forensics and Investigations (Book & CD), 4th Edition~~ * A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security * ~~Introduction to Modern Cryptography: Principles and Protocols~~ * ~~Cryptography Engineering: Design Principles and Practical Applications~~ * ~~Network Security: Current Status and Future Directions~~ * Management of Information Security, 3rd Edition * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~ -
technmsg revised this gist
Sep 5, 2015 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -12,3 +12,5 @@ A selection of computer security textbooks. All in excellent condition, some nev * Network Security: Current Status and Future Directions * Management of Information Security, 3rd Edition * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~ If you're interested, drop me a line via email or [Twitter](https://twitter.com/technmsg/status/640163944729047040); GitHub doesn't currently provide notifications of Gist comments (ref [1](https://gist.github.com/maxogden/3422419) [2](https://github.com/isaacs/github/issues/21)). -
technmsg revised this gist
Sep 5, 2015 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -11,4 +11,4 @@ A selection of computer security textbooks. All in excellent condition, some nev * Cryptography Engineering: Design Principles and Practical Applications * Network Security: Current Status and Future Directions * Management of Information Security, 3rd Edition * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~ -
technmsg revised this gist
Sep 5, 2015 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -11,3 +11,4 @@ A selection of computer security textbooks. All in excellent condition, some nev * Cryptography Engineering: Design Principles and Practical Applications * Network Security: Current Status and Future Directions * Management of Information Security, 3rd Edition * The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities -
technmsg created this gist
Sep 5, 2015 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,13 @@ A selection of computer security textbooks. All in excellent condition, some never opened. Free to a good home if you'll cover shipping. * Security Engineering: A Guide to Building Dependable Distributed Systems * Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) * Cryptography Engineering: Design Principles and Practical Applications * Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition * Metasploit: The Penetration Tester's Guide * Guide to Computer Forensics and Investigations (Book & CD), 4th Edition * A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security * Introduction to Modern Cryptography: Principles and Protocols * Cryptography Engineering: Design Principles and Practical Applications * Network Security: Current Status and Future Directions * Management of Information Security, 3rd Edition