| 1 |
|
The Pentester BluePrint: Starting a Career as an Ethical Hacker
by
4.16 avg rating — 223 ratings
|
|
| 2 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
4.18 avg rating — 55 ratings
|
|
| 3 |
|
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by
3.89 avg rating — 257 ratings
|
|
| 4 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.76 avg rating — 7,225 ratings
|
|
| 5 |
|
Social Engineering: The Science of Human Hacking
by
3.83 avg rating — 3,876 ratings
|
|
| 6 |
|
The Art of Attack: Attacker Mindset for Security Professionals
by
3.79 avg rating — 66 ratings
|
|
| 7 |
|
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
by
3.93 avg rating — 1,793 ratings
|
|
| 8 |
|
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
by
3.78 avg rating — 1,467 ratings
|
|
| 9 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by
3.91 avg rating — 3,591 ratings
|
|
| 10 |
|
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
by
4.10 avg rating — 42 ratings
|
|
| 11 |
|
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
by
3.79 avg rating — 28 ratings
|
|
| 12 |
|
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
by
4.26 avg rating — 31 ratings
|
|
| 13 |
|
Unauthorised Access: Physical Penetration Testing for IT Security Teams
by
3.85 avg rating — 136 ratings
|
|
| 14 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
|
|
| 15 |
|
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
4.21 avg rating — 184 ratings
|
|
| 16 |
|
Cryptography Engineering: Design Principles and Practical Applications
by
4.21 avg rating — 406 ratings
|
|
| 17 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 155 ratings
|
|
| 18 |
|
Hacking Multifactor Authentication
by
4.30 avg rating — 20 ratings
|
|
| 19 |
|
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
by
3.50 avg rating — 12 ratings
|
|
| 20 |
|
Kali Linux Penetration Testing Bible
by
4.20 avg rating — 25 ratings
|
|
| 21 |
|
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
by
3.93 avg rating — 46 ratings
|
|
| 22 |
|
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
by
3.88 avg rating — 67 ratings
|
|
| 23 |
|
Cybersecurity Blue Team Toolkit
by
3.67 avg rating — 42 ratings
|
|
| 24 |
|
Threat Modeling: Designing for Security
by
4.08 avg rating — 287 ratings
|
|
| 25 |
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
by
4.21 avg rating — 2,135 ratings
|
|
| 26 |
|
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by
4.23 avg rating — 1,227 ratings
|
|
| 27 |
|
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
by
really liked it 4.00 avg rating — 45 ratings
|
|