Picture
Cyber Crime

The Ordering Of The Books In The List Is Arbitrary
“Library” means I recommend it for a Forensic Lab Library

2011         Windows Registry Forensics.  Harlan Carvey  (Library)
                 Burlington:Syngress
                 (Well written book on registry forensics. Even experienced examiners will learn. Comes with a CD. )

2011         iOS Forensic Analysis.  Sean Morrissey.  Apress   (Library)
                 (A must read book on iPhone/iPad/iPod forensics.)        

2010         Cryptography Engineering.  N.Ferguson, B. Schneier, T. Kohono  (Library)
                 Indianapolis:Wiley
                 (Everything you ever wanted to know about cryptography.  Great book)

2009        Cisco Router and Switch Forensics.  Dave Liu. Elsevier Science.
                (Techie read, but clear approach to Router/Switch forensics)

2009        Microsoft Windows Internals 5th Ed.. Mark Russinovich, et.al. (Library)
                Redmond:Microsoft Press
                (Everything you ever wanted to know about Windows TxF. Techie read, but worth the struggle.)

2008       Malware Forensics: Investigating and Analyzing Malicious Code.  J. Aquillina, E. Casey, C. Malin
               Burlington:Syngress
               (Thorough yet readable guide to malicious code investigation. References many tools.)

2007       Mac OS X Internals: A Systems Approach.  Amit Sing  (Library)
               Boston:Addison-Wesley
               (The analog of Russinovich/Soloman’s book for Mac systems.  Techie read for 1600 pages)

2009       Windows Forensic Analysis:.DVD Toolkit, 2nd Ed  Harlen Carvey  (Library)
                Burlington:Syngress
                (Understandable and easy read..  Updated and improved edition.)

2006         Real Digital Forensics.  K. Jones, R. Bejtlich, C. Rose
                 Upper Saddle River NJ:Addison Wesley
                 (Part IV of the book is a good review of unknown file analysis, the rest of the book is simplistic)

2006        Counter Hack Reloaded.  Ed Skoudis (Library)
                New Jersey:Prentice Hall
                (An excellent  book on intrusion defense - 2nd edition. Easy read but full of information.)

2005        Reversing: Secrets of Reverse Engineering. Eldad Eilam
                Indianapolis:Wiley
                (A very technical book but worth the read.)

2005        Microsoft Windows Internals 4th Ed. Mark Russinovich & David Soloman (Library)
                Redmond:Microsoft Press
                (Everything you ever wanted to know about Windows NTFS. Techie read, but worth the struggle.)

2005         The Art of Computer Virus Research and Defense.  Peter Szor (Library)
                  Upper Saddle River NJ:Addison Wesley
                  (A detailed review of viruses. This is to viruses as Carrier’s book is to forensics. A great read. )  

2005         File System Forensic Analysis.  Brian Carrier.  (Library)
                 Boston:Addison Wesley
                (A must have for any forensic examiner.  Clear, complete, and concise discussion of file systems)

2005        Investigating Child Exploitation and Pornography. Monique Ferraro & Eoghan Casey
                Amsterdam:Elsevier Academic Press
                (Excellent read for beginners, good review for experienced investigators. Up-to-date info)

2004        Malware:Fighting Malicious Code.  Ed Skoudis with Lenny Zletser
                New Jersey:Prentice Hall
                (An excellent, easy to read compendium on all malware threats. Best I’ve read on the topic)

2003        Black Ice:The Invisible Threat of Cyber-Terrorism. Dan Verton
                New York: McGraw-Hill
                (Sometimes a bit overstated, but a good primer on Cyber-Terrorist threat).

2003       Secrets of Computer Espionage   Joel McNamara
               Indianapolis:Wiley Publishing
               (Pretext is a bit hokey, but the book is full of solid information - a great primer on forensics)

2003        Honeypots: Tracking Hackers.  Lance Spitzner
                Boston:Addison-Wesley
                (Great book on an emerging security tactic. Easy read and informative.)

2002         Disappearing Cryptography (2nd Edition).  Peter Wayner
                 Amsterdam:Morgan Kaufmann Publishers
                 (Excellent text on Steganography, Watermarking, and Information Hiding)

2002        The Art of Deception.  Kevin Mitnick & William Simon
                 Indianapolis:Wiley Publishing
                 (An easy to read yet informative book on social engineering - a must read for “Red Teams”.)

2002         Sex & The Internet: A Guidebook For Clinicians.  Al Cooper (Ed.)
                 New York:Brunner-Routledge
                (A compilation of articles concerning Internet Sex. Aimed at therapists, but
                 provides some information for investigators as well).

2002         Handbook of Computer Crime Investigation. Eoghan Casey (Ed.) (Library)
                 San Diego:Academic Press
                 (A broad scope survey book written by leaders in each area. Worth reading.)

2002          Computer Forensics: Incident Response Essentials. W. Kruse II & J Heiser. (Library)
                  Boston:Addison Wesley
                  (Clear and fairly comprehensive “how to” book of computer forensics)

2002         Computer Forensics: Computer Crime Scene Investigation.  John Vacca
                 Hingham:Charles River Media
                 (A survey book, a bit “fluffy”, but contains some good material)

2002        Cyber Crime Investigator’s Field Guide.  Bruce Middleton
                Boca Raton:Auerbach
                (A bit dated, but covers many of the non-integrated forensic tools.)

2001        Computer Forensics and Privacy.  Michael Caloyannides.
                Boston:Artech House
                (Interesting read from the privacy perspective.  Good material & he knows his stuff.)

2001         Cybersex Exposed.  Jennifer Schneider, Robert Weiss.
                 Center City:Hazelden
                 (Covers diffentiation between use of and addicition to cybersex)

2001         Demystifying Virtual Private Networks.  Michael Busby
                 Plano:Wordware Publishing
                 (Straight forward and clear text about VPN. Easy read.)

2001          Incident Response.  Kevin Mandia & Chris Prosise
                  New York: Osborne/McGraw Hill
                  (Excellent review of computer forensics methods)

2001         Hack Attacks Revealed.  John Chirillo
                 New York:John Wiley & Sons.
                 (Good technical manual on hacking and defenses. Includes CD ROM with tools)

2001       Hacking Exposed, 2nd Edition.  J. Scambray, S. McClure, & G. Kurtz
               New York:John Wiley & Sons.
               (A classic text-book re-issued and updated.  Volumes of information).

2001       Windows 2000 Registry: Little Black Book (2nd Edition).  Nathan Wallace &
               Anthony Sequeria  Scottsdale:Coriolis Technology Press
               (A must have read on Windows 2000 registry).

1999       Windows 98 Registry.  John Worman.
               Chicago:MIS Press
               (Excellent resource on Windows 98 registry).

1996       Windows 95 Registry.  John Worman.
               Chicago:MIS Press
               (Excellent resource on Windows 95 registry).

2001      Exam Prep A+.  S. Reeves, K. Reeves, S. Weese, & C. Geyer
              Scottsdale:Coriolis Technology Press
              (Great technical review of hardware issues)

2000     Bigelow’s Troubleshooting, Maintaining & Repairing PCs (4th Ed.)
             Stephen Bigelow.  New York:Osborne/McGraw Hill
             (Another great resource on hardware and hardware issues)
.