Infosec


Hacking: The Art of Exploitation w/CD
The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Red Team Field Manual
Penetration Testing: A Hands-On Introduction to Hacking
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Fewer than one in twenty security professionals has the core competence and the foundation knowledge to take a system all the way from a completely unknown state of security through mapping, vulnerability testing, password cracking, modem testing, vulnerability patching, firewall tuning, instrumentation, virus detection at multiple entry points, and even through back-ups and configuration management.
Stephen Northcutt, Network Intrusion Detection

We’ve gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

More quotes...
Welcome to the Cyber Security Book Club — a community for infosec professionals, ethical hackers…more
2 members, last active 6 months ago
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
189 members, last active 2 months ago
OWASP OpenSAMM Book Club This group is not affiliated with OWASP. List of books to facilitate the implementation of Open…more
1 member, last active 9 years ago