| 1 |
|
Red Team Field Manual
by
4.22 avg rating — 996 ratings
|
|
| 2 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,212 ratings
|
|
| 3 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,674 ratings
|
|
| 4 |
|
Blue Team Field Manual (BTFM) (Field Manual Series)
by
4.19 avg rating — 355 ratings
|
|
| 4 |
|
The Florentine Deception
by
3.78 avg rating — 357 ratings
|
|
| 6 |
|
Hackers: Heroes of the Computer Revolution
by
4.16 avg rating — 8,537 ratings
|
|
| 7 |
|
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by
3.97 avg rating — 27,230 ratings
|
|
| 8 |
|
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
by
3.92 avg rating — 248 ratings
|
|
| 9 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 605 ratings
|
|
| 10 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
|
|
| 11 |
|
Zero Ri$k
by
4.43 avg rating — 223 ratings
|
|
| 12 |
|
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
by
3.97 avg rating — 3,364 ratings
|
|
| 13 |
|
Zero Day (Jeff Aiken, #1)
by
3.57 avg rating — 5,888 ratings
|
|
| 14 |
|
Trojan Horse (Jeff Aiken, #2)
by
3.80 avg rating — 2,271 ratings
|
|
| 15 |
|
Rogue Code (Jeff Aiken, #3)
by
3.91 avg rating — 1,251 ratings
|
|
| 16 |
|
The World's Most Dangerous Geek: And More True Hacking Stories
by
3.60 avg rating — 2,016 ratings
|
|
| 17 |
|
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
by
4.23 avg rating — 22 ratings
|
|
| 18 |
|
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
by
3.71 avg rating — 3,100 ratings
|
|
| 19 |
|
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
by
4.28 avg rating — 137 ratings
|
|
| 20 |
|
The Computer Incident Response Planning Handbook: Executable Plans For Protecting Information At Risk
by
3.80 avg rating — 15 ratings
|
|
| 21 |
|
Data-Driven Security: Analysis, Visualization and Dashboards
by
4.04 avg rating — 79 ratings
|
|
| 22 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 264 ratings
|
|
| 23 |
|
IT Auditing: Using Controls to Protect Information Assets
by
3.88 avg rating — 43 ratings
|
|
| 24 |
|
Network Security Through Data Analysis: Building Situational Awareness
by
3.88 avg rating — 50 ratings
|
|
| 25 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
4.18 avg rating — 65 ratings
|
|
| 26 |
|
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by
4.12 avg rating — 286 ratings
|
|
| 27 |
|
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
by
4.14 avg rating — 28 ratings
|
|
| 28 |
|
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
by
4.03 avg rating — 29 ratings
|
|
| 29 |
|
Cybersecurity and Cyberwar: What Everyone Needs to Know
by
3.83 avg rating — 1,399 ratings
|
|
| 30 |
|
Operation Desolation: The Case of the Anonymous Bank Defacement
by
3.83 avg rating — 414 ratings
|
|
| 31 |
|
In the Plex: How Google Thinks, Works, and Shapes Our Lives
by
3.84 avg rating — 29,967 ratings
|
|
| 32 |
|
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
by
4.04 avg rating — 1,599 ratings
|
|