UHWO CSCC Library
The titles below are available for student reading and research in the UHWO CSCC, E205. These reference materials cannot be removed from the CSCC.
Title | Author | ISBN |
---|---|---|
A Nation Rising: Hawaiian Movements for Life, Land and Sovereignty | Noelani Goodyear-Ka’opua, Ikaika Hussey and Erin Kahunawaika’ala Wright | 9780822356950 |
All-In-One CompTIA Security+ Exam SY0-401 Exam Guide 4th Edition | WM Arthur Conklin and Gregory White | 9780071841245 |
Android Hacker’s Handbook | Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin Mulliner, Stephen A. Ridley and Georg Wicherski | 9781118608647 |
Applied Cyber Security and the Smart Grid | Eric D. Knapp | 9781597499989 |
Applied Network Security Monitoring | Chris Sanders and Jason Smith | 9780124172081 |
Black Hat Python: Python Programming for Hackers and Pentesters | Justin Seitz | 9781593275907 |
Blue Team Handbook: Incident Response Edition | Don Murdoch | 9781500734756 |
Building an Information Security Awareness Program | Bill Garner and Valerie Thomas | 9780124199675 |
Building Virtual Pentesting Labs for Advance Penetration Testing | Kevin Cardwell | 9781783284771 |
CCENT/CCNA ICND1 100-105 Official Cert Guide | Wendell Odom | 9781587205804 |
CCNA Routing and Switching ICND2 200-105 | Wendell Odom | 9781587205798 |
CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide | Charles L. Brooks | 9780071831567 |
CISSP Study Guide Third Edition | Eric Conrad, Seth Misenar, Joshua Feldman | 9780128024379 |
CISSP: Certified Information Systems Security Professional Official Study Guide | James Michael Stewart | 9781119042716 |
CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide | Darril Gibson | 9781939136022 |
Counter Hack Reloaded | Ed Skoudis | 9780131481046 |
Crafting the InfoSec Playbook | Jeff Bollinger | 9781491949405 |
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners | Jason Andress, Steve Winterfeld | 9780124166721 |
Digital Forensics For Legal Professionals | Larry E. Daniel, Lars E. Daniel | 9781597496438 |
Ethical Hacking and Countermeasures v9 – Volume 1 | EC-Council | N/A |
Ethical Hacking and Countermeasures v9 – Volume 2 | EC-Council | N/A |
Ethical Hacking and Countermeasures v9 – Volume 3 | EC-Council | N/A |
Fuzzing: Brute Force Vulnerability Discovery | Michael Sutton, Adam Greene, Pedram Amini | 9780321446114 |
Go! with Microsoft Office 2013 Volume 1 | Shelley Gaskin, Alicia Vargas and Carolyn McLellan | 9780133142662 |
Google Hacking for Penetration Testers | Johnny Long | 9780128029640 |
Guide to Computer Forensics and Investigations | Bill Nelson, Amelia Phillips, Christopher Steuart | 9781285060033 |
Hacking Exposed 7: Network Security Secrets & Solutions | Stuart McClure, Joel Scambray and George Kurtz | 9780071780285 |
Hacking Web Apps: Detecting and Preventing Web Application Security Problems | Mike Shema | 9781597499514 |
Hacking: The Art of Exploitation | Jon Erickson | 9781593271442 |
Handbook of SCADA/Control Systems Security | Robert Radvanovsky | 9781466502260 |
Hands-On Ethical Hacking and Network Defense | Michael T. Simpson, Kent Backman, James E. Corley | 9781133935612 |
Industrial Network Security | Eric D. Knapp | 9780124201149 |
Industrial Process Automation Systems: Design and Implementation | B.R. Methta | 9780128009390 |
iOS Hacker’s Handbook | Charlie Miller, Dionysus Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo and Ralf-Phillip Weinmann | 9781118204122 |
Java Software Solutions: Foundations of Program Design 8th Edition | John Lewis and William Loftus | 9780133594959 |
Kali Linux Network Scanning Cookbook | Justin Hutchens | 9781783982141 |
Kali Linux Wireless Penetration Testing | Vivek Ramachandran | 9781783280414 |
Mastering Kali Linux for Advanced Penetration Testing | Robert W. Beggs | 9781782163121 |
Mastering Windows Server 2012 R2 | Mark Minasi, Kevin Greene, Christian Booth, Robert Butler, JOhn McCabe, Robert Panek, Michael Rice and Stefan Roth | 9781118289426 |
Metasploit: The Penetration Tester’s Guide | David Kennedy | 9781593272883 |
Microsoft Office 2010 Volume 1 2nd Edition | Robert T. Gauer, Mary Anne Poatsy, Keith Mulbery, Michelle Hulett, Cynthia Krebs and Keith Mast | 9780132873604 |
Microsoft Office Access 2010 Comprehensive | Robert T. Gauer, Keith Mast and Mary Anne Poatsy | 9780135098257 |
Microsoft Office Excel 2010 Comprehensive | Robert T. Grauer, Keith Mulbery and Mary Anne Poatsy | 9780135098592 |
Mike Meyer’s Certification Passport: CompTIA Security+ Exam SY0-401 4th Edition | Dawn Dunkerley and T.J. Samuelle | 9780071832144 |
Network Intrusion Analysis | Joe Fichera and Steven Bolt | 9781597499620 |
Nmap 6 Cookbook: The Fat Free Guide to Network Scanning | Nicholas Marsh | 9781507781388 |
Nmap Network Scanning | Gordon Lyon | 9780979958717 |
Open Source Intelligence Techniques 4th Edition | Michael Bazzell | 9781508636335 |
Penetration Tester’s Open Source Toolkit | Jeremy Faircloth | 9781597496278 |
Penetration Testing: A Hands-On Introduction to Hacking | Georgia Weidman | 9781593275648 |
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software | Michael Sikorski and Andrew Honig | 9781593272906 |
Practice Exams CompTIA Security + | Daniel Lachance and Glen E. Clarke | 9780071833448 |
Professional Penetration Testing | Thomas Wilhelm | 9781597499934 |
Red Team Field Manual | Ben Clark | 9781494295509 |
Research Design: Qualitative, Quantitative and Mixed Methods Approaches | John W. Creswell | 9781452226101 |
Reversing: Secrets of Reverse Engineering | Eldad Eilam | 9780764574818 |
Revised Information Technology Project Management 7th Edition | Kathy Schwalbe | 9781285847092 |
Security Awareness: Applying Practical Security in Your World | Mark Ciampa | 9781111644185 |
Security in Computing 5th Edition | Charles P. Pfleeger | 9780134085043 |
Software Engineering 6th Edition | Ian Sommerville | 020139815X |
Stealing the Network: How to Own a Continent | Ryan Russell | 9781931836050 |
Stealing the Network: How to Own the Box | Ryan Russell | 9781931836876 |
The Hacker Playbook 2 | Peter Kim | 9781512214567 |
The Mobile Application Hacker’s Handbook | Dominic Chell, Tyrone Erasmus, Shaun Colley and Ollie Whitehouse | 9781118958506 |
The Network Security Test Lab: A Step-by-Step Guide | Michael Gregg | 9781118987056 |
The Shellcoder’s Handbook 2nd Edition | Chris Anley, John Heasman, Felix “FX” Lindner and Gerardo Richarte | 9780470080238 |
The Web Application Hacker’s Handbook 2nd Edition | Dafydd Stuttard and Marcus Pinto | 9781118026472 |
Threat Modeling: Designing for Security | Adam Shostack | 9781118809990 |
Unix and Linux Systems Administration Handbook 4th Edition | Evi Nemeth, Garth Snyder, Trent R. Hein and Ben Whaley | 9780131480056 |
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | TJ O’Connor | 9781597499576 |
Virtualization Security | Dave Shackleford | 9781118288122 |
Windows Forensics Analysis Toolkit | Harlan Carvey | 9780124171572 |
Wireshark Network Analysis – The Offical Wireshark Certified Network Analyst Study Guide | Laura Chappell | 9781893939943 |
Your Career How to Make it Happen 8th Edition | Lauri Harwood | 9781111572310 |