Incident Response & Computer Forensics, Third Edition
The Art of Memory Forensics
Troubleshooting with the Windows Sysinternals Tools
Blue Team Handbook: Incident Response Edition
Blue Team Field Manual (BTFM)
Practical Forensic Imaging
Designing and Building Security Operations Center
How to Develop and Implement a Security Master Plan
Ransomware: Defending Against Digital Extortion
Offensive Countermeasures: The Art of Active Defense
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Wireshark 101, Laura Chappel
TCP/IP Illustrated, Vol 1
The Practice of Network Security Monitoring
Practical Packet Analysis, 3rd Edition
Network Forensics: Tracking Hackers Through Cyberspace
Defensive Security Handbook
Network Security Assessment


Advanced Penetration Testing
Penetration Testing: A Hands On Introduction
Hacking: The Art of Exploitation
The Hacker Playbook 2
The Shellcoder's Handbook
Complete Guide to Shodan
Hacking Exposed Industrial Control Systems
RTFM: Red Team Field Manual
Hacking: The Art of Exploitation


The Linux Commandline Complete Introduction
Linux Commandline and Shell Scripting Bible
Powershell in a Month of Lunches
Windows Powershell Cookbook
Black Hat Python
Violent Python
Learn Python3 the Hard Way


TC Programming Language (2nd Edition)
A Crash Course in C
The C++ Programming Language
C++ crash course for C programmers
Blackhat Go

Social Engineering

Social Engineering: The Art of Human Hacking
Social Engineer's Playbook
Building an Information Security Awareness Program
SANS Recommend Security Books


Handbook of Applied Cryptography
An Introduction to Mathematical Cryptography
Cryptography Engineering - Niels Ferguson
Cryptography and Network Security Principles - William Stallings
Practical Cryptograph - Niels Ferguson
GCHQ - Richard Aldrich
The Code Book - Simon Singh

Contact Us

Liza Wilson Durant, PhD

Director, Commonwealth Cyber Initiative (CCI) NoVa Node

George Mason University, 4400 University Drive, MS 4A3, Fairfax, VA 22030