50 Useful book for working in a SOC

ReZa AdineH
3 min readMar 5, 2023

--

  1. “Security Operations Center: Building, Operating, and Maintaining your SOC” by Joseph Muniz, Gary McIntyre, and Nadhem AlFardan (2021)
  2. “Security Operations Center Guidebook: A Practical Guide for a Successful SOC” by Jeff Bollinger and Brandon Enright (2018)
  3. “Building and Managing a Security Operations Center” by Christopher L. Williams and Steve Brubaker (2017)
  4. “Security Operations Center Playbook: A Field Guide for Achieving Efficient Incident Response” by Joseph Muniz and Gary McIntyre (2017)
  5. “SOC 2 Compliance Handbook: A Guide for Getting Started” by Karen Scarfone (2016)
  6. “The Practice of Network Security Monitoring: Understanding Incident Detection and Response” by Richard Bejtlich (2013)
  7. “Security Information and Event Management (SIEM) Implementation” by David Miller (2012)
  8. “Security Operations Management” by Robert McCrie (2011)
  9. “The Tao of Network Security Monitoring: Beyond Intrusion Detection” by Richard Bejtlich (2004)
  10. “Defending the Digital Frontier: A Security Agenda” by Richard A. Clarke and Robert Knake (2017)
  11. “Cybersecurity and Cyberwar: What Everyone Needs to Know” by P.W. Singer and Allan Friedman (2014)
  12. “Cybersecurity: The Essential Body of Knowledge” by Dan Shoemaker et al. (2018)
  13. “Enterprise Security Architecture: A Business-Driven Approach” by John Sherwood et al. (2006)
  14. “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes” by Dawn M. Cappelli et al. (2012)
  15. “The Incident Response Handbook: A Field Guide for Computer Forensics Investigators” by N.K. McCarthy (2015)
  16. “Security Metrics: A Beginner’s Guide” by Caroline Wong (2011)
  17. “Hacker Techniques, Tools, and Incident Handling” by Sean-Philip Oriyano et al. (2018)
  18. “Cybersecurity and Cybercrime: Principles, Challenges, and Practices” by Thomas J. Holt and Adam M. Bossler (2018)
  19. “CISO Desk Reference Guide: A Practical Guide for CISOs” by William F. Slater, III (2018)
  20. “The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws” by Dafydd Stuttard and Marcus Pinto (2011)
  21. “Security Operations Center for Dummies” by David Cowen (2016)
  22. “Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies” by Ira Winkler and Araceli Treu Gomes (2016)
  23. “Implementing Digital Forensic Readiness: From Reactive to Proactive Process” by Jason Sachowski and Jarmo Kajala (2016)
  24. “Effective Cybersecurity: A Guide to Using Best Practices and Standards” by William Stallings (2014)
  25. “Computer Forensics: Investigating Data and Image Files” by EC-Council (2014)
  26. “Security Operations Center: Building, Implementing, and Operating a Successful SOC” by Joseph Muniz (2019)
  27. “Cybersecurity Operations Handbook” by J.W. Rittinghouse and William M. Hancock (2017)
  28. “The Art of Network Penetration Testing: Ethical Hacking and Penetration Testing Made Easy” by Royce Davis (2014)
  29. “The Manager’s Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program” by Edward Halibozek et al. (2014)
  30. “Managing Information Security” by John R. Vacca (2016)
  31. “Security Operations Center: Building, Operating, and Maintaining your SOC” by Joseph Muniz, Gary McIntyre, and Nadhem AlFardan (2021)
  32. “Defending the Digital Frontier: A Security Agenda” by Richard A. Clarke and Robert Knake (2017)
  33. “Security Information and Event Management (SIEM) Implementation” by David Miller (2012)
  34. “Network Security: Private Communication in a Public World” by Charlie Kaufman et al. (2006)
  35. “Hacker Techniques, Tools, and Incident Handling” by Sean-Philip Oriyano et al. (2022)
  36. “The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws” by Dafydd Stuttard and Marcus Pinto (2021)
  37. “Cybersecurity and Cybercrime: Principles, Challenges, and Practices” by Thomas J. Holt and Adam M. Bossler (2020)
  38. “Mastering Python for Networking and Security” by Jose Manuel Ortega (2018)
  39. “Security Operations Center Guidebook: A Practical Guide for a Successful SOC” by Jeff Bollinger and Brandon Enright (2018)
  40. “Building and Managing a Security Operations Center” by Christopher L. Williams and Steve Brubaker (2017)
  41. “Cybersecurity: The Essential Body of Knowledge” by Dan Shoemaker et al. (2018)
  42. “Enterprise Security Architecture: A Business-Driven Approach” by John Sherwood et al. (2014)
  43. “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes” by Dawn M. Cappelli et al. (2016)
  44. “The Incident Response Handbook: A Field Guide for Computer Forensics Investigators” by N.K. McCarthy (2017)
  45. “Security Metrics: A Beginner’s Guide” by Caroline Wong (2017)
  46. “Implementing Digital Forensic Readiness: From Reactive to Proactive Process” by Jason Sachowski and Jarmo Kajala (2016)
  47. “Effective Cybersecurity: A Guide to Using Best Practices and Standards” by William Stallings (2019)
  48. “Computer Forensics: Investigating Data and Image Files” by EC-Council (2015)
  49. “Information Security: Principles and Practices” by Mark S. Merkow and Jim Breithaupt (2014)
  50. “Cybersecurity and Cyberwar: What Everyone Needs to Know” by P.W. Singer and Allan Friedman (2014)

--

--

ReZa AdineH
ReZa AdineH

Written by ReZa AdineH

Hey, this is Reza Adineh, SOC Architect and consultant, SIEM Engineer, Threat Detection Engineer. follow me on RezaAdineh.info

No responses yet