Intelguardians Main Page
Consulting Services
Information Security Asessments
Forensics and Incident Response
Patch Cycle, Vulnerability Remediation  and Mitigation Strategies
Company Information + Bios
Events Speaking Conferences
Publications Books Articles
Cutting Edge Research
Contact Information
Site Map
 




Books

Nessus Network Auditing

by Jimmy Alderson, Jay Beale, et al


Etheral Packet Sniffing

by Jay Beale, et al


Nessus, Snort, Ethereal Powertools:

Customizing Open Source Security

Applications

by Jay Beale , et al


Red Hat Internet Server

by Jay Beale , et al


Stealing The Network:

How to Own a Continent

by Jay Beale , et al


Stealing The Network:

How to Own an Identity

by Jay Beale , et al


Unix Unleashed

by Jay Beale , et al


Snort 2.1

by Mike Poor, Jay Beale, et al


Counter Hack

by Ed Skoudis


Counter Hack Reloaded

by Ed Skoudis, and Tom Liston


Malware: Fighting Malicious Code

by Ed Skoudis with Lenny Zeltser

 

 

 


Contact@intelguardians.com
Copyright © 2007 Intelguardians, Inc.