Vous êtes sur la page 1sur 11

R: R R R RRequired R R RNew REnglish RFile R R ROxford RUniversity RPress R

:
* ) Beginner (
R R R R R R R
Intermediate (
* )

R R R R R R

* ) Advanced (
R R R R

( Beginner
)
Mathematics :
:*

- Arithmetic
- Pre-Algebra
- Algebra I
- Geometry
- Algebra II
- Trigonometry
- Probability & Statistics
* :
-

MyOpenMath
Coursera
CK-12 Foundation
Art of Problem Solving (AoPS)
Computer Science :
:Programming )(
Python 3 /1/
:*

- Learn to Program: The Fundamentals


- Learn to Program: Crafting Quality Code
- Practical Programming: An Introduction to Computer Science Using Python 3
- The Python Standard Library by Example
- Learning Python, Mark Lutz
* :
- Programming Python, Mark Lutz
- Core Python Applications Programming
- Python 3 Object Oriented Programming

- C Programming Language ANSI


- C Programming: A Modern Approach
- The Standard C Library
- Practical C Programming
- C Primer Plus
- Understanding and Using C Pointers
- Mastering Algorithms with C
- Expert C Programming: Deep C Secrets
- Linux System Programming: Talking Directly to the Kernel and C Library
- The Linux Programming Interface: A Linux and UNIX System Programming
Handbook

C ANSI /2/
:*

:*

- Fundamentals of Logic Design

- The Hardware/Software Interface


- Computer Systems: A Programmers Perspective

Digital Logic Design )(

Computer Organization )(

Networks )(
- Computer Networks
- Computer Networks, Tanenbaum

:*

- The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference


- Computer Networking from LANs to WANs: Hardware, Software and Security
- Network Warrior

:*


)
( Intermediate
Mathematics :

:*

Pre-Calculus
Differential Calculus
Integral Calculus
Multivariable Calculus
Differential Equations
Linear Algebra

Introduction to Logic
Intermediate Algebra
Pre-Calculus
Calculus: Single Variable
Calculus One
Calculus Two: Sequences and Series

MyOpenMath
Coursera
CK-12 Foundation
Art of Problem Solving (AoPS)

:*

:*

Computer Science :
Computer Architecture )(
- Computer Architecture
- Computer Architecture: A Quantitative Approach
* :

:*

Microprocessor Design /*
-

Fundamentals of Digital Logic with VHDL Design


Digital Logic and Microprocessor Design with VHDL
Microprocessor Design: A Practical Guide from Design Planning to Manufacturing
Modern Processor Design: Fundamentals of Superscalar Processors
Operating Systems: Internals :)(

- Operating System Concepts


- Operating Systems: Internals and Design Principles
*/ Win32
- Windows Internals, Part 1
- Windows Internals, Part 2

:*

:*

*/ Mac OS X
- Mac OS X and iOS Internals: To the Apples Core
*/ Linux
- Understanding the Linux Kernel
- Linux Kernel Development
:Programming )(
C++ ISO /3/
:*

- C++ Without Fear: A Beginners Guide That Makes You Feel Smart
- The C++ Programming Language
- The C++ Standard Library: A Tutorial and Reference
-

:*

C++ Primer
C++ Primer Plus
Programming: Principles and Practice Using C++
C++ Concurrency in Action: Practical Multithreading

Assembly /4/
Intel x86 & _64 :*
-

Assembly Language Step-by-Step: Programming with Linux


The Art of Assembly Language
Professional Assembly Language
Introduction to 64 Bit Intel Assembly Language Programming for Linux
ARM :*

- ARM Assembly Language: Fundamentals and Techniques


- ARM System Developers Guide: Designing and Optimizing System Software
Algorithms /5/
- Algorithms, Part I
- Algorithms, Part II
- Algorithms: Design and Analysis, Part I
- Algorithms: Design and Analysis, Part II

:*
:*

)
( Advanced

Information Security
R R R R R R R R R R R R R R R:

R R R R R R R R R R R R R R R R R

Reverse Engineering
- Reversing: Secrets of Reverse Engineering
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and
Obfuscation

Web Applications Security


Solid Rbackground Rin RWeb RDevelopment :
:

Web Application Security, A Beginners Guide


The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Web Application Hackers Handbook: Finding and Exploiting Security Flaws
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Web Application Defenders Cookbook: Battling Hackers and Protecting Users
The Tangled Web: A Guide to Securing Modern Web Applications
Web Application Obfuscation
Hacking Exposed Web Applications

Software Security
Reverse REngineering R:

The Shellcoders Handbook: Discovering and Exploiting Security Holes


The Browser Hackers Handbook
Exploiting Software: How to Break Code
Hacking: The Art of Exploitation

Software Security :

Database Security
Solid Rbackground Rin RDatabases R:

The Database Hackers Handbook: Defending Database Servers


SQL Injection Attacks and Defense
The Oracle Hackers Handbook: Hacking and Defending Oracle
Securing SQL Server: Protecting Your Database from Attackers

Malware: Analysis
Network Security, Software Security :

Malicious Software and its Underground Economy: Two Sides to Every Story :

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Malware Analysts Cookbook: Tools and Techniques for Fighting Malicious Code
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Rootkits: Subverting the Windows Kernel
Hacking Exposed: Malware & Rootkits Secrets & Solutions
Managed Code Rootkits: Hooking into Runtime Environments

Network Security
Network Packet , Flow , Monitoring , Protocols , Wireless , Cloud :
- Practical Packet Analysis
- Network Flow Analysis
- The Practice of Network Security Monitoring: Understanding Incident Detection and
Response
- Applied Network Security Monitoring: Collection, Detection, and Analysis
- Hacking VoIP: Protocols, Attacks, and Countermeasures
- Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
- Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions
- Wireless Network Security A Beginners Guide
- Hacking Exposed: Wireless Security Secrets & Colutions
- Hacking Exposed: Network Security Secrets & Solutions
- Network and System Security
- Network Security Essentials Applications and Standards
- Securing the Cloud: Cloud Computer Security Techniques and Tactics

Cryptology
Solid background in Mathematics, Software Security, Network Security :
Cryptography, Cryptanalysis :
:
Number Rtheory R R
Information Rtheory R R
Complexity Rtheory R R
Group Rtheory R R

Probability Rtheory R R
Abstract Ralgebra R R
Combinatorics R R
-

Understanding Cryptology: Core Concepts


Understanding Cryptology: Cryptanalysis
Cryptography I
Cryptography II
Applied Cryptography: Science of Secrets
An Introduction to Mathematical Cryptography
Understanding Cryptography: A Textbook for Students and Practitioners
Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Open-Source Software
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Cryptography Engineering
Handbook of Applied Cryptography, Discrete Mathematics and Its Applications
Foundations of Cryptography: Volume 1, Basic Tools
Foundations of Cryptography: Volume 2, Basic Applications
Modern Cryptography: Theory and Practice
Handbook of Elliptic and Hyperelliptic Curve Cryptography
Cryptography and Network Security: Principles and Practice
Introduction to Modern Cryptography: Principles and Protocols
Everyday Cryptography: Fundamental Principles and Applications
Public Key Cryptography: Applications and Attacks
Cryptography: Theory and Practice
Implementing SSL / TLS Using Cryptography and PKI
Elementary Cryptanalysis
Modern Cryptanalysis: Techniques for Advanced Code Breaking
Applied Cryptanalysis: Breaking Ciphers in the Real World
Malicious Cryptography: Exposing Cryptovirology

Social Engineering

- Social Engineering: The Art of Human Hacking


- The Art of Deception: Controlling the Human Element of Security
- Spy the Lie: Former CIA Officers Teach You How to Detect Deception
- Unmasking the Social Engineer: The Human Element of Security
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and
Deceivers
- No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
- What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People
- Covert Persuasion: Psychological Tactics and Tricks to Win the Game
- The Official CIA Manual of Trickery and Deception
- Surveillance Countermeasures: A Serious Guide To Detecting, Evading, And Eluding
Threats To Personal Privacy
- The Art of Intelligence: Lessons from a Life in the CIA's Clandestine Service

Penetration Testing
:

- Penetration Testing: A Hands-On Introduction to Hacking


- The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing
Made Easy
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and
Security Engineers
- Gray Hat Hacking The Ethical Hackers Handbook
- Penetration Testers Open Source Toolkit
- Professional Penetration Testing: Creating and Learning in a Hacking Lab
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security
Guide (Open Source: Community Experience Distilled)
- Unauthorised Access: Physical Penetration Testing For IT Security Teams
- Basic Security Testing with Kali Linux
- Practical Lock Picking: A Physical Penetration Testers Training Guide
- Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based
Attacks Against Physical Locks
- Coding for Penetration Testers: Building Better Tools
- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
- Wireless Reconnaissance in Penetration Testing
- Build Your Own Security Lab: A Field Guide for Network Testing
- Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
- Learning Pentesting for Android Devices
- The Hackers Handbook: The Strategy Behind Breaking Into and Defending Networks

Digital Forensics
:

- The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
- Digital Forensics with Open Source Tools
- Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO
17025, ISO 27001 and Best Practice Requirements
- Computer Forensics InfoSec Pro Guide
- An Excerpt from Malware Forensic Field Guide for Linux Systems Larger Cover Linux
Malware Incident Response: A Practitioners Guide to Forensic Collection and Examination
of Volatile Data
- Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
- Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
- Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
- Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7
- Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
- Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative
Techniques to Identify Cybercrime Suspects
- Digital Forensics for Legal Professionals: Understanding Digital Evidence From The
Warrant To The Courtroom
- Real Digital Forensics: Computer Security and Incident Response
- Network Forensics: Tracking Hackers through Cyberspace
- File System Forensic Analysis
- Cloud Storage Forensics
- Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual
Environments
- iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone,
iPad and iOS Devices
- iOS Forensic Analysis: for iPhone, iPad, and iPod touch
- XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
- Android Forensics: Investigation, Analysis and Mobile Security for Google Android
- X-Ways Forensics Practitioners Guide

- Hacking Exposed Computer Forensics: Secrets & Solutions


- Mastering Windows Network Forensics and Investigation
- Malware Forensics: Investigating and Analyzing Malicious Code
- Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide
for Moving Targets and Data
- The Art of Memory Forensics

Mobile Security
Mobile OS: Android or IPhone, Programming: Java or Objective-C, Software :

Security
:

- iOS Hackers Handbook


- Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to
Prevent It
- Android Security Cookbook
- Android Hackers Handbook
- Android Security: Attacks and Defenses
- Hacking Exposed Mobile: Security Secrets & Solutions

Hardware Security
- Hardware Security
- Introduction to Hardware Security and Trust
- Computer Architecture and Security: Fundamentals of Designing Secure Computer
Systems

:
:

OS Security
- The Mac Hackers Handbook
- The Hackers Guide to OS X: Exploiting OS X from the Root Up
- A Guide to Kernel Exploitation: Attacking the Core

Vous aimerez peut-être aussi