Books
Nessus Network Auditing
by Jimmy Alderson, Jay Beale, et al
Ethereal Packet Sniffing
by Jay Beale, et al
Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications
by Jay Beale, et al
Snort 2.1
by Mike Poor, Jay Beale, et al
Stealing The Network: How to Own a Continent
by Jay Beale, et al
Stealing The Network: How to Own an Identity
by Jay Beale, et al
Red Hat Linux Internet Server
by Jay Beale, et al
Unix Unleashed
by Jay Beale, et al
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
by Chris Sanders
Applied Network Security Monitoring: Collection, Detection, and Analysis
by Chris Sanders
Malware: Fighting Malicious Code
by Ed Skoudis and Lenny Zeltser
Counter Hack
by Ed Skoudis
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
by Ed Skoudis and Tom Liston
All links are non-affiliated