| 1 |
|
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
by
4.98 avg rating — 52 ratings
|
|
| 2 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 606 ratings
|
|
| 3 |
|
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
by
4.29 avg rating — 176 ratings
|
|
| 4 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 155 ratings
|
|
| 5 |
|
Incident Response & Computer Forensics, Third Edition
by
4.33 avg rating — 112 ratings
|
|
| 6 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 264 ratings
|
|
| 7 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
4.18 avg rating — 65 ratings
|
|
| 8 |
|
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
by
4.03 avg rating — 550 ratings
|
|
| 9 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.24 avg rating — 1,225 ratings
|
|
| 10 |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
by
3.94 avg rating — 323 ratings
|
|
| 11 |
|
Social Engineering
by
3.83 avg rating — 3,872 ratings
|
|
| 12 |
|
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions
by
3.57 avg rating — 30 ratings
|
|
| 13 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
|
|
| 14 |
|
Network Forensics: Tracking Hackers through Cyberspace
by
4.21 avg rating — 67 ratings
|
|
| 15 |
|
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
by
4.21 avg rating — 468 ratings
|
|
| 16 |
|
Agent Storm: My Life Inside al Qaeda and the CIA
by
4.01 avg rating — 1,965 ratings
|
|
| 17 |
|
Terrorism and Counterintelligence: How Terrorist Groups Elude Detection
by
4.23 avg rating — 26 ratings
|
|
| 18 |
|
Chinese intelligence operations
by
3.72 avg rating — 102 ratings
|
|
| 19 |
|
The Art of Intelligence
by
3.84 avg rating — 3,156 ratings
|
|
| 20 |
|
The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda
by
4.28 avg rating — 2,883 ratings
|
|
| 21 |
|
See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
by
3.94 avg rating — 5,199 ratings
|
|
| 22 |
|
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
by
3.87 avg rating — 239 ratings
|
|
| 23 |
|
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
by
4.11 avg rating — 120 ratings
|
|
| 24 |
|
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
by
4.11 avg rating — 164 ratings
|
|
| 25 |
|
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.12 avg rating — 611 ratings
|
|
| 26 |
|
Digital Forensics with Open Source Tools
by
4.23 avg rating — 61 ratings
|
|
| 27 |
|
File System Forensic Analysis
by
4.28 avg rating — 186 ratings
|
|
| 28 |
|
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
by
4.07 avg rating — 15 ratings
|
|
| 29 |
|
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
by
4.20 avg rating — 45 ratings
|
|
| 30 |
|
Offensive Countermeasures: The Art of Active Defense
by
4.13 avg rating — 104 ratings
|
|
| 31 |
|
Real Digital Forensics: Computer Security and Incident Response
by
4.20 avg rating — 92 ratings
|
|
| 32 |
|
The Tangled Web: A Guide to Securing Modern Web Applications
by
4.04 avg rating — 553 ratings
|
|
| 33 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
|
|
| 34 |
|
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
4.21 avg rating — 184 ratings
|
|
| 35 |
|
Reversing: Secrets of Reverse Engineering
by
4.09 avg rating — 545 ratings
|
|
| 36 |
|
Windows Internals: Covering Windows Server 2008 and Windows Vista
by
4.49 avg rating — 178 ratings
|
|