Acervo bibliotecario

Libros que se pueden consultar en el acervo bibliotecario de la MISTI.


Autor Título
Akhgar, Babak, Staniforth, Andrew y Bosco, Francesca Cyber crime and cyber terrorism. Investigator's handbook
Alcorn, Wade, Frichot, Christian y Orrù, Michele The Browser. Hacker's Handbook
Anson, Steve, et al Mastering Windows netrork forensics and Investigation
Barski, Conrad y Wilmer, Chris Bitcoin for the befuddled
Bazzel, Michael Hiding from the internet. Eliminating personal online information
Bdeir, Ayah y Richardson, Matt Make: Getting Started with littleBits
Briggs, Jason R. Python for Kids. A playful introduction to programming
Cappelli, Dawn, Moore, Andrew y Trzeciak, Randall The CERT guide to insider threats. How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
Chell, Dominic, et al The Mobile Application. Hacker's Handbook
Cutcher, Dave Electronic circuits for the evil genius
Dang, Bruce, et al Practical reverse engineering. X86, X64, ARM, Windows kernel, reversing tools and obfuscation
Drake, Joshua J. et al Android Hacker's Handbook
Dwivedi, Himansu Hacking VoIP
Eagle, Chris The Ida Pro book. The unofficial guide to the world's most popular disassembler
Elenkov, Nikolay Android Security Internals. An In-depth guide to Android's Security Architecture
Graham amd Kathy McGowan 101 spy gadgets for the evil genius
Hadnagy, Christopher y Fincher, Michele Phishing dark waters. The offensive and defensive sides of malicious e-mails
Hale Ligh, Michael, et al The art of memory forensics
Harrington, Michael y Cross Michael Google earth forensics. Using Google Earth Geo-Location in digital forensic investigation
Iannini, Bob Electronic gadgets for the evil genius
Karvinen, Kimmo y Karvinen, Tero Make: Getting Started with Sensors
Kim, Peter The hacker playbook 2. Practical guide to penetration testing
Landbridge, James A. Arduino Sketches. Tools and Techniques for Programming Wizardry
Luttgens, Jason T., Pepe, Matthew y Mandia, Kevin Incident Response & computer forensics
Molloy, Derek Exploring Beaglebone. Tools and Techniques for building with embedded linux
Monk, Simon Hacking Electronics. An ilustrated DIY guide for makers and hobbyists
Monk, Simon Make your own PCBs with EAGLE
Monk, Simon Programming Arduino. Next Steps. Going further with sketches
Monk, Simon Programming the BeagleBone Black. Getting started with JavaScript and BoneScript
Monk, Simon 30 Arduino projects for the evil genius
Monk, Simon Arduino + Android projects for the evil genius
Polstra, Philip Linux Forensics with Python and shell scripting
Seitz, Justin Black hat python. Python programming for hackers and pentesters
Seitz, Justin Gray hat python. Python programming for hackers and reverse enginieers
Shimonski, Robert Cyber reconnaissance, surveillance and defense
Shostack, Adam Threat modeling. Designing for security
Sood, Aditya S. y Enbody, Richard Targeted Cyber Attacks
Street, Jayson E., Sims, Kristin y Baskin, Brian Dissecting the hack. The V3rboten network
Wassom, Brian D. Augmented reality law, privacy, and ethics
Wrightson, Tyler Advanced persistent threat hacking. The art and science of hacking any organization
Zetter, Kim Countdown to Zero Day. Stuxnet and the launch of the World's first digital weapon