| 1 |
|
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
by
4.98 avg rating — 54 ratings
|
|
| 2 |
|
The Tangled Web: A Guide to Securing Modern Web Applications
by
4.04 avg rating — 554 ratings
|
|
| 3 |
|
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
by
3.93 avg rating — 249 ratings
|
|
| 4 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.47 avg rating — 605 ratings
|
|
| 5 |
|
Penetration Testing: A Hands-On Introduction to Hacking
by
4.18 avg rating — 397 ratings
|
|
| 6 |
|
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
by
4.21 avg rating — 472 ratings
|
|
| 7 |
|
Social Engineering
by
3.83 avg rating — 3,908 ratings
|
|
| 8 |
|
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by
4.23 avg rating — 1,228 ratings
|
|
| 8 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.76 avg rating — 7,259 ratings
|
|
| 10 |
|
Hacking: The Art of Exploitation w/CD
by
4.17 avg rating — 2,518 ratings
|
|
| 11 |
|
A Guide to Kernel Exploitation: Attacking the Core
by
4.25 avg rating — 53 ratings
|
|
| 12 |
|
Hacking Wireless Networks - The ultimate hands-on guide
by
4.32 avg rating — 19 ratings
|
|
| 12 |
|
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
by
3.88 avg rating — 24 ratings
|
|
| 14 |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by
3.97 avg rating — 8,082 ratings
|
|
| 15 |
|
Web Penetration Testing: Hack Your Way
by
4.92 avg rating — 12 ratings
|
|
| 16 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 266 ratings
|
|
| 17 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 869 ratings
|
|
| 18 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,333 ratings
|
|
| 19 |
|
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by
really liked it 4.00 avg rating — 3,876 ratings
|
|
| 20 |
|
Next Generation Red Teaming
by
2.40 avg rating — 5 ratings
|
|
| 20 |
|
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
by
4.20 avg rating — 1,785 ratings
|
|
| 22 |
|
Future Crimes
by
3.92 avg rating — 4,396 ratings
|
|
| 23 |
|
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
by
4.26 avg rating — 50,137 ratings
|
|
| 24 |
|
Security Engineering: A Guide to Building Dependable Distributed Systems
by
4.21 avg rating — 703 ratings
|
|
| 25 |
|
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
by
4.22 avg rating — 223 ratings
|
|
| 26 |
|
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
by
4.07 avg rating — 15,092 ratings
|
|
| 27 |
|
Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
by
3.67 avg rating — 54 ratings
|
|
| 28 |
|
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by
4.34 avg rating — 10,100 ratings
|
|
| 29 |
|
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
by
4.03 avg rating — 815 ratings
|
|
| 30 |
|
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Security, Audit and Leadership Series)
by
4.29 avg rating — 14 ratings
|
|
| 31 |
|
Unsecurity: Information security is failing. Breaches are epidemic. How can we fix this broken industry?
by
4.14 avg rating — 22 ratings
|
|
| 32 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
4.20 avg rating — 56 ratings
|
|
| 33 |
|
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
by
3.83 avg rating — 1,109 ratings
|
|
| 34 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 16,008 ratings
|
|
| 35 |
|
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
by
4.41 avg rating — 53,887 ratings
|
|
| 36 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure
by
3.90 avg rating — 141 ratings
|
|
| 37 |
|
Thinking in Bets: Making Smarter Decisions When You Don't Have All the Facts
by
3.82 avg rating — 23,416 ratings
|
|
| 38 |
|
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
by
4.12 avg rating — 587 ratings
|
|
| 39 |
|
Hacking Exposed: Network Security Secrets & Solutions
by
3.80 avg rating — 1,164 ratings
|
|
| 40 |
|
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
by
4.20 avg rating — 30 ratings
|
|
| 41 |
|
Writing Secure Code
by
4.01 avg rating — 373 ratings
|
|
| 42 |
|
Real-World Bug Hunting: A Field Guide to Web Hacking
by
4.21 avg rating — 141 ratings
|
|
| 43 |
|
Hacking: The Art of Exploitation
by
4.17 avg rating — 2,518 ratings
|
|
| 44 |
|
Designing BSD Rootkits: An Introduction to Kernel Hacking
by
4.18 avg rating — 51 ratings
|
|
| 45 |
|
Malware Data Science: Attack Detection and Attribution
by
3.89 avg rating — 53 ratings
|
|
| 46 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
|
|
| 47 |
|
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
by
4.05 avg rating — 56 ratings
|
|
| 48 |
|
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
by
4.27 avg rating — 138 ratings
|
|
| 49 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
4.18 avg rating — 65 ratings
|
|
| 50 |
|
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
by
4.51 avg rating — 73 ratings
|
|
| 51 |
|
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
by
3.93 avg rating — 128 ratings
|
|
| 52 |
|
Foundations of Information Security: A Straightforward Introduction
by
4.06 avg rating — 127 ratings
|
|
| 53 |
|
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
by
4.46 avg rating — 205 ratings
|
|
| 54 |
|
Windows Internals, Part 2: Covering Windows Server 2008 R2 and Windows 7
by
4.55 avg rating — 105 ratings
|
|
| 55 |
|
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.12 avg rating — 616 ratings
|
|
| 56 |
|
Network Attacks and Exploitation: A Framework
by
4.12 avg rating — 50 ratings
|
|
| 57 |
|
TCP/IP Illustrated, Volume 1: The Protocols
by
4.50 avg rating — 150 ratings
|
|
| 58 |
|
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
by
4.49 avg rating — 209 ratings
|
|
| 59 |
|
Secrets and Lies: Digital Security in a Networked World
by
3.93 avg rating — 1,795 ratings
|
|
| 60 |
|
Red Team Field Manual
by
4.23 avg rating — 1,001 ratings
|
|
| 61 |
|
Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases: A condensed field guide for the Security Operations team
by
4.42 avg rating — 60 ratings
|
|
| 62 |
|
Blue Team Field Manual (BTFM) (Field Manual Series)
by
4.20 avg rating — 358 ratings
|
|
| 63 |
|
Operator Handbook: Red Team + OSINT + Blue Team Reference
by
4.40 avg rating — 95 ratings
|
|
| 64 |
|
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by
4.12 avg rating — 286 ratings
|
|
| 65 |
|
Social Engineering: The Science of Human Hacking
by
3.83 avg rating — 3,908 ratings
|
|
| 66 |
|
Unmasking the Social Engineer: The Human Element of Security
by
3.71 avg rating — 282 ratings
|
|
| 67 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
by
4.45 avg rating — 419 ratings
|
|