Infosec


Hacking: The Art of Exploitation w/CD
The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Red Team Field Manual
Penetration Testing: A Hands-On Introduction to Hacking
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Metasploit: The Penetration Tester's Guide
Understanding the Human Factor in Cyber Security by Christopher Stephenson
Information Security Must Reads
1 book — 1 voter
You'll See This Message When It Is Too Late by Josephine WolffThinking about Cybersecurity by Paul RosenzweigDawn of the Code War by John P. CarlinCult of the Dead Cow by Joseph MennThe Cuckoo's Egg by Clifford Stoll
Key Cybersecurity Reads
12 books — 1 voter

Web Hacking Arsenal by Rafay  BalochThe Tangled Web by Michal ZalewskiA Bug Hunter's Diary by Tobias KleinPractical Malware Analysis by Michael SikorskiPenetration Testing by Georgia Weidman
Books For the Aspiring Hacker
67 books — 42 voters
The Art of Deception by Kevin D. MitnickKingdom of Lies by Kate FazziniConfident Cyber Security by Jessica BarkerCyberwar by Kathleen Hall JamiesonQuiet by Susan Cain
Women in Cybersecurity
22 books — 3 voters

Daemon by Leinad ZerausFreedom™ by Daniel SuarezReady Player One by Ernest ClineThe Scorpion by John A. AuteroThe OSSI Model - The Gannon Transcripts by Kent Stern
Geek Thrillers
22 books — 23 voters

If we wish to have any hope of beating the bad guys at the cyber game, the good guys must learn to share more effectively and efficiently than them
Alex Webling

Cities require connectivity rather than territory in order to drive their economic stability and growth.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

More quotes...
OWASP OpenSAMM Book Club This group is not affiliated with OWASP. List of books to facilitate the implementation of Open…more
1 member, last active 9 years ago
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
184 members, last active 3 years ago
Welcome to the Cyber Security Book Club — a community for infosec professionals, ethical hackers…more
2 members, last active 2 months ago