Books

Nessus Network Auditing
by Jimmy Alderson, Jay Beale, et al

Ethereal Packet Sniffing
by Jay Beale, et al

Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications
by Jay Beale, et al

Snort 2.1
by Mike Poor, Jay Beale, et al

Stealing The Network: How to Own a Continent
by Jay Beale, et al

Stealing The Network: How to Own an Identity
by Jay Beale, et al

Red Hat Linux Internet Server
by Jay Beale, et al

Unix Unleashed
by Jay Beale, et al

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
by Chris Sanders

Applied Network Security Monitoring: Collection, Detection, and Analysis
by Chris Sanders

Malware: Fighting Malicious Code
by Ed Skoudis and Lenny Zeltser

Counter Hack
by Ed Skoudis

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
by Ed Skoudis and Tom Liston
All links are non-affiliated