tag:blogger.com,1999:blog-4088979.post6687942458986428091..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Best Book Bejtlich Read in 2009Richard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-4088979.post-34238860952615432812010-01-17T01:52:00.800-05:002010-01-17T01:52:00.800-05:00I like the Web application hacker's handbook.
...I like the Web application hacker's handbook.<br /><br />-NiteshAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-71138821627065032602010-01-06T07:20:49.497-05:002010-01-06T07:20:49.497-05:00Hi Mike,
I am working with Keith Jones on another...Hi Mike,<br /><br />I am working with Keith Jones on another forensics book. I would like to write a new "Network Visibility Survival Guide" book. I'd also like to update Tao, or at least write a new book covering Tao themes. The question, as always, is time!Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-90788591528386414962010-01-05T13:35:53.180-05:002010-01-05T13:35:53.180-05:00Speaking of books, I am looking forward to your ne...Speaking of books, I am looking forward to your new one in 2010! I have your 3 other books which are really great! Any plans to update Extrusion Detection or "The Tao of Network Security Monitoring" ?Unknownhttps://www.blogger.com/profile/04942965180592320921noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-75482175596429874032010-01-05T12:05:15.182-05:002010-01-05T12:05:15.182-05:00Agreed on WAHH as #2, the book was awesome. I keep...Agreed on WAHH as #2, the book was awesome. I keep it on my desk as a reference.Hidden Muscle BJJhttps://www.blogger.com/profile/06399606602249781402noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-49555607698280646662010-01-03T06:43:50.730-05:002010-01-03T06:43:50.730-05:00Thanks for sharing this. I can confirm that the IP...Thanks for sharing this. I can confirm that the IPv6 Security Book is really great.<br /><br />I think I will also get the three web-sec related books as well.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-38509368085662218652010-01-02T07:01:01.838-05:002010-01-02T07:01:01.838-05:00Good list! I have been recommending Web Applicati...Good list! I have been recommending Web Application Hacker's Handbook to folks for a while.<br /><br />My choice for best book of 2009 would be Bill Blunden's The Rootkit Arsenal. It's a weighty tome, and absolutely chock-filled with well-written explanations of some very low-level technical stuff. Excellent value for your money, and the author makes it an enjoyable read.Wesley McGrewhttp://mcgrewsecurity.comnoreply@blogger.com