Books

Nessus Network Auditing

by Jimmy Alderson, Jay Beale, et al

Ethereal Packet Sniffing

by Jay Beale, et al

Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications 

by Jay Beale, et al

Snort 2.1 

by Mike Poor, Jay Beale, et al

Stealing The Network: How to Own a Continent

by Jay Beale, et al

Stealing The Network: How to Own an Identity

by Jay Beale, et al

Red Hat Linux Internet Server

by Jay Beale, et al

Unix Unleashed

by Jay Beale, et al

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

by Chris Sanders

Applied Network Security Monitoring: Collection, Detection, and Analysis

by Chris Sanders

Malware: Fighting Malicious Code

by Ed Skoudis and Lenny Zeltser

Counter Hack

by Ed Skoudis

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses

by Ed Skoudis and Tom Liston

All links are non-affiliated