Intrusion Signatures and Analysis - by Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick
Snort 2.0 Intrusion Detection - by Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth

Security Targets
Books