Skip to content

Instantly share code, notes, and snippets.

@technmsg
Last active February 11, 2025 10:47

Revisions

  1. technmsg revised this gist Sep 7, 2015. 1 changed file with 44 additions and 4 deletions.
    48 changes: 44 additions & 4 deletions cyber-books.md
    Original file line number Diff line number Diff line change
    @@ -1,16 +1,56 @@
    A selection of computer security textbooks. All in excellent condition, some never opened. Free to a good home if you'll cover shipping.
    A selection of computer textbooks, ranging the gamut from system administration to low-level hardware to cyber security management. All in excellent condition, some never opened.

    Free to a good home if you'll cover shipping, although *some* of them are old enough that they'd be cheaper to order from Amazon directly.

    Unclaimed books will be donated to [The Book Thing of Baltimore](http://www.bookthing.org/).

    ## Computer Hardware

    * White. How Computers Work (Millenium Edition)
    * Rosch. [Winn L. Rosch Hardware Bible](http://www.amazon.com/gp/product/0789717433/?tag=alexmp-20) (5th Edition)

    ## Computer Programming

    * Roberts. [Director 7 Demystified: The Official Guide to Macromedia Director, Lingo, and Shockwave](http://www.amazon.com/gp/product/0201354454/?tag=alexmp-20)
    * Harringer. [Introduction to Computer Programming with Visual Basic 6](http://www.amazon.com/gp/product/1580762417/?tag=alexmp-20) (1st Edition)

    ## Computer Security

    * Parker. [Fighting Computer Crime: A New Framework for Protecting Information](http://www.amazon.com/gp/product/0471163783/?tag=alexmp-20)
    * Crume. [Inside Internet Security: What Hackers Don't Want You To Know](http://www.amazon.com/gp/product/0201675161/?tag=alexmp-20) (1st Edition)
    * Bishop. [Introduction to Computer Security](http://www.amazon.com/gp/product/0321247442/?tag=alexmp-20) (1st Edition)
    * ~~Security Engineering: A Guide to Building Dependable Distributed Systems~~
    * ~~Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)~~
    * ~~Cryptography Engineering: Design Principles and Practical Applications~~
    * ~~Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition~~
    * ~~Metasploit: The Penetration Tester's Guide~~
    * ~~Guide to Computer Forensics and Investigations (Book & CD), 4th Edition~~
    * A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
    * Klein. [A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security](http://www.amazon.com/gp/product/1593273851/?tag=alexmp-20)
    * ~~Introduction to Modern Cryptography: Principles and Protocols~~
    * ~~Cryptography Engineering: Design Principles and Practical Applications~~
    * ~~Network Security: Current Status and Future Directions~~
    * Management of Information Security, 3rd Edition
    * Whitman. [Management of Information Security](http://www.amazon.com/gp/product/1435488849/?tag=alexmp-20) (3rd Edition)
    * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~

    If you're interested, drop me a line via email or [Twitter](https://twitter.com/technmsg/status/640163944729047040); GitHub doesn't currently provide notifications of Gist comments (ref [1](https://gist.github.com/maxogden/3422419) [2](https://github.com/isaacs/github/issues/21)).
    ## Networking

    * Hecht. Understanding Fiber Options. (1st Edition)
    * Black. [IP Routing Protocols: RIP, OSPF, BGP, PNNI and Cisco Routing Protocols](http://www.amazon.com/gp/product/0130142484/?tag=alexmp-20)
    * Oppenheimer. [Top-Down Network Design](http://www.amazon.com/gp/product/1578700698/?tag=alexmp-20) (1st Edition)
    * Stallings. Data and Computer Communications (4th Edition)
    * Odom. [CCNA INTRO Exam Certification Guide](http://www.amazon.com/gp/product/1587200945/?tag=alexmp-20) (CCNA Self-Study, 640-821, 640-801)
    * Odom. [CCNA ICND Exam Certification Guide](http://www.amazon.com/gp/product/158720083X/?tag=alexmp-20) (CCNA Self-Study, 640-811, 640-801)
    * [Cisco CCNA Network Simulator](http://www.amazon.com/gp/product/1587201313/?tag=alexmp-20) (CCNA Self-Study, 640-801)
    * Kurose. [Computer Networking: A Top-Down Approach](http://www.amazon.com/gp/product/0136079679/?tag=alexmp-20) (5th Edition)

    ## System Administration

    * Nemeth, et al. [UNIX System Administration Handbook](http://www.amazon.com/gp/product/0130206016/?tag=alexmp-20) (3rd Edition)
    * Linux Administration: A Beginners Guide (2nd Edition)
    * Harvel et al. [The UNIX and Windows 2000 Handbook: Planning, Integration and Administration](http://www.amazon.com/gp/product/0130254932/?tag=alexmp-20) (1st Edition)
    * Shinder. [Managing Windows 2000 Network Services](http://www.amazon.com/gp/product/1928994067/?tag=alexmp-20)
    * Stallings. [Operating Systems: Internals and Design Principles](http://www.amazon.com/gp/product/0136006329/?tag=alexmp-20) (6th Edition)

    If you're interested, drop me a line via email or [Twitter](https://twitter.com/technmsg/status/640163944729047040).

    Note: GitHub doesn't currently provide notifications of Gist comments (ref [1](https://gist.github.com/maxogden/3422419) [2](https://github.com/isaacs/github/issues/21)).
  2. technmsg revised this gist Sep 5, 2015. 1 changed file with 9 additions and 9 deletions.
    18 changes: 9 additions & 9 deletions cyber-books.md
    Original file line number Diff line number Diff line change
    @@ -1,15 +1,15 @@
    A selection of computer security textbooks. All in excellent condition, some never opened. Free to a good home if you'll cover shipping.

    * Security Engineering: A Guide to Building Dependable Distributed Systems
    * Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
    * Cryptography Engineering: Design Principles and Practical Applications
    * Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
    * Metasploit: The Penetration Tester's Guide
    * Guide to Computer Forensics and Investigations (Book & CD), 4th Edition
    * ~~Security Engineering: A Guide to Building Dependable Distributed Systems~~
    * ~~Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)~~
    * ~~Cryptography Engineering: Design Principles and Practical Applications~~
    * ~~Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition~~
    * ~~Metasploit: The Penetration Tester's Guide~~
    * ~~Guide to Computer Forensics and Investigations (Book & CD), 4th Edition~~
    * A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
    * Introduction to Modern Cryptography: Principles and Protocols
    * Cryptography Engineering: Design Principles and Practical Applications
    * Network Security: Current Status and Future Directions
    * ~~Introduction to Modern Cryptography: Principles and Protocols~~
    * ~~Cryptography Engineering: Design Principles and Practical Applications~~
    * ~~Network Security: Current Status and Future Directions~~
    * Management of Information Security, 3rd Edition
    * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~

  3. technmsg revised this gist Sep 5, 2015. 1 changed file with 2 additions and 0 deletions.
    2 changes: 2 additions & 0 deletions cyber-books.md
    Original file line number Diff line number Diff line change
    @@ -12,3 +12,5 @@ A selection of computer security textbooks. All in excellent condition, some nev
    * Network Security: Current Status and Future Directions
    * Management of Information Security, 3rd Edition
    * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~

    If you're interested, drop me a line via email or [Twitter](https://twitter.com/technmsg/status/640163944729047040); GitHub doesn't currently provide notifications of Gist comments (ref [1](https://gist.github.com/maxogden/3422419) [2](https://github.com/isaacs/github/issues/21)).
  4. technmsg revised this gist Sep 5, 2015. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion cyber-books.md
    Original file line number Diff line number Diff line change
    @@ -11,4 +11,4 @@ A selection of computer security textbooks. All in excellent condition, some nev
    * Cryptography Engineering: Design Principles and Practical Applications
    * Network Security: Current Status and Future Directions
    * Management of Information Security, 3rd Edition
    * The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
    * ~~The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities~~
  5. technmsg revised this gist Sep 5, 2015. 1 changed file with 1 addition and 0 deletions.
    1 change: 1 addition & 0 deletions cyber-books.md
    Original file line number Diff line number Diff line change
    @@ -11,3 +11,4 @@ A selection of computer security textbooks. All in excellent condition, some nev
    * Cryptography Engineering: Design Principles and Practical Applications
    * Network Security: Current Status and Future Directions
    * Management of Information Security, 3rd Edition
    * The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
  6. technmsg created this gist Sep 5, 2015.
    13 changes: 13 additions & 0 deletions cyber-books.md
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,13 @@
    A selection of computer security textbooks. All in excellent condition, some never opened. Free to a good home if you'll cover shipping.

    * Security Engineering: A Guide to Building Dependable Distributed Systems
    * Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
    * Cryptography Engineering: Design Principles and Practical Applications
    * Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
    * Metasploit: The Penetration Tester's Guide
    * Guide to Computer Forensics and Investigations (Book & CD), 4th Edition
    * A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
    * Introduction to Modern Cryptography: Principles and Protocols
    * Cryptography Engineering: Design Principles and Practical Applications
    * Network Security: Current Status and Future Directions
    * Management of Information Security, 3rd Edition