A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Irongeek In Print: Books that mention Irongeek.com

Irongeek In Print
Books that mention Irongeek.com

        I did some looking around and it seems my site is mentioned in a few books. I've decided to start this page to keep track of book references to Irongeek.com. If I'm missing any please let me know, I found these via Google Books and Amazon.

  Research Handbook on Governance of the Internet (Pages 213 & 216)
By Ian Brown
June 30, 2013
Edward Elgar Pub
ISBN: 1849805024 |
 
Introduction to Cyber-Warfare: A Multidisciplinary Approach (A few times in Chapter 6 )
By Paulo Shakarian, Jana Shakaria, Andrew Ruef
June 18, 2013
Syngress
ISBN: 0124078141
Keys to the Kingdom : Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks (Page xii, just a "Thank You")
by Ollam, Deviant
Oct 8, 2012
Syngress
ISBN: 1597499838
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001 (Comptia Study Guide)  (Page 461)
by Michael Gregg, Billy Haines
May 16, 2012
Packt Publishing
ISBN: 1849517746
Sécurité PHP5 et MySQL (page 264)
by Damien Seguy, Philippe Gamache
Feb 2, 2012
Eyrolles
ISBN: 2212125542
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Pages 164, 165, 283, 384)
by By Lee Allen
Jun 1, 2012
Packt Publishing Ltd
ISBN: 1849517746
  CEH Certified Ethical Hacker All-in-One Exam Guide (Page 333)
by Matt Walker
September 7, 2011
McGraw-Hill Osborne Media
ISBN: 0071772294
Penetration Tester's Open Source Toolkit, Third Edition (Pages 22, 181)
by Jeremy Faircloth
August 1, 2011
Syngress
ISBN: 1597496278
Metasploit: The Penetration Tester's Guide (Page 158)
by David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
July 22, 2011
No Starch Press
ISBN: 159327288X
Windows 7 Annoyances (Page 460)
by David A. Karp
Published 2010
O'Reilly Media, Inc
ISBN: 0596157622
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (Page 118)
September 24, 2010
Syngress
ISBN: 1597495883
  Dissecting the Hack: The F0rb1dd3n Network: The F0rb1dd3n Network (Page 193)
by Jayson E. Street, Kent Nabors
July 15, 2010
Syngress
ISBN: 1597495689
  The Proceedings of the 5th International Conference on Information Warfare and Security (Page 249)
April 8, 2010
IT Security Management (Page 238)
by Alberto Partida, Diego Andina
Published 2010
Springer
ISBN: 9048188814
  Guide to Computer Forensics and Investigation
by Bill Nelson, Amelia Phillips
September 28, 2009
Cengage Learning
ISBN: 1435498836
Stealing the network: the complete series collector's edition (Page 453)
By Ryan Russell, Johnny Long, Timothy Mullen
Published 2009
Syngress
ISBN: 159749299X
Security Awareness: Applying Pracitical Security in Your World (Page 66)
By Mark Ciampa
Published 2009
Cengage Learning
ISBN 1435454146

Security+ Guide to Network Security Fundamentals (Page 72)
by Mark Ciampa
Published 2008
Course Technology
ISBN: 1428340661

Kismet Hacking (Page 227)
by Brad Haines and Frank Thornton
Published 2008
Syngress
ISBN:1597491179
Security Power Tools (Page 100)
by Bryan Burns, Jennifer Granick, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi
Published 2007
O'Reilly
ISBN:0596009631
Windows Vista Annoyances (Page 371)
by David A. Karp
Published 2008
O'Reilly
ISBN:0596527624
Stealing the Network: How to Own a Shadow (Page 268)
by Johnny Long, Timothy Mullen, Ryan Russell, Scott Pinzon
Published 2007
Syngress
ISBN:1597490814
Z4ck (Page 187)
by Kevin Milne
Published 2004
PageFree Publishing, Inc
ISBN:1589613120







 

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast