It Security


The Art of Deception: Controlling the Human Element of Security
Threat Modeling: Designing for Security
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Security Engineering: A Guide to Building Dependable Distributed Systems
Hacking: The Art of Exploitation w/CD
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Social Engineering
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Security Metrics: Replacing Fear, Uncertainty, and Doubt
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Practical UNIX & Internet Security
Stealing the Network: How to Own the Box
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Hackers by Steven LevyJulian Assange - The Unauthorised Autobiography by Julian AssangeWe Are All Targets by Matt PotterThe Cathedral & the Bazaar by Eric S. RaymondEpic Win for Anonymous by Cole Stryker
History of Hackers
18 books — 3 voters
The Box by Marc LevinsonCyberwar by Richard A. ClarkeCritical Infrastructure Protection in Homeland Security by Ted G. LewisThe Edge of Disaster by Stephen FlynnResilience by Andrew Zolli
Books of Critical Infrastructure
14 books — 7 voters