| 1 |
|
Security Engineering: A Guide to Building Dependable Distributed Systems
by
4.21 avg rating — 700 ratings
|
|
| 2 |
|
Introduction to Security and Applied Cryptography
by
3.82 avg rating — 11 ratings
|
|
| 3 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 606 ratings
|
|
| 4 |
|
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
by
4.89 avg rating — 9 ratings
|
|
| 5 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.23 avg rating — 1,221 ratings
|
|
| 6 |
|
Secrets and Lies: Digital Security in a Networked World
by
3.93 avg rating — 1,791 ratings
|
|
| 7 |
|
The Tangled Web: A Guide to Securing Modern Web Applications
by
4.04 avg rating — 553 ratings
|
|
| 8 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.77 avg rating — 7,205 ratings
|
|
| 9 |
|
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
by
4.30 avg rating — 28,726 ratings
|
|
| 10 |
|
Web Penetration Testing: Hack Your Way
by
4.92 avg rating — 12 ratings
|
|
| 11 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 262 ratings
|
|
| 12 |
|
The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws
by
4.27 avg rating — 15 ratings
|
|
| 13 |
|
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
by
3.78 avg rating — 1,467 ratings
|
|
| 14 |
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
by
4.21 avg rating — 2,133 ratings
|
|
| 15 |
|
CISSP All-in-One Exam Guide
by
4.10 avg rating — 925 ratings
|
|
| 16 |
|
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
by
4.04 avg rating — 1,595 ratings
|
|
| 17 |
|
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2)
by
4.42 avg rating — 170 ratings
|
|
| 17 |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by
3.97 avg rating — 8,039 ratings
|
|
| 19 |
|
The Hacker Playbook: Practical Guide to Penetration Testing
by
3.96 avg rating — 468 ratings
|
|
| 20 |
|
The Browser Hacker's Handbook
by
4.14 avg rating — 76 ratings
|
|
| 21 |
|
Practical Lock Picking: A Physical Penetration Tester's Training Guide
by
4.27 avg rating — 324 ratings
|
|
| 22 |
|
The OSSI Model - The Gannon Transcripts
by
4.53 avg rating — 34 ratings
|
|
| 23 |
|
Down the Rabbit Hole: An Osint Journey Open Source Intelligence Gathering for Penetration Testing
by
3.88 avg rating — 16 ratings
|
|
| 24 |
|
Computer Security: Art and Science
by
3.77 avg rating — 56 ratings
|
|
| 25 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 865 ratings
|
|
| 25 |
|
Hacking: The Art of Exploitation w/CD
by
4.17 avg rating — 2,499 ratings
|
|
| 27 |
|
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
by
4.15 avg rating — 330 ratings
|
|
| 28 |
|
Android Hacker's Handbook
by
3.94 avg rating — 118 ratings
|
|
| 29 |
|
Secure Programming with Static Analysis
by
3.72 avg rating — 18 ratings
|
|
| 30 |
|
Cyberwar: The Next Threat to National Security & What to Do About It
by
3.73 avg rating — 2,450 ratings
|
|
| 30 |
|
Reversing: Secrets of Reverse Engineering
by
4.09 avg rating — 545 ratings
|
|
| 32 |
|
Beyond Fear: Thinking Sensibly About Security in an Uncertain World.
by
really liked it 4.00 avg rating — 703 ratings
|
|
| 32 |
|
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
by
3.43 avg rating — 21 ratings
|
|
| 34 |
|
LTE Security
by
4.20 avg rating — 5 ratings
|
|
| 34 |
|
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
by
4.18 avg rating — 1,506 ratings
|
|
| 36 |
|
The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization
by
3.89 avg rating — 1,318 ratings
|
|
| 37 |
|
Software Security: Building Security In
by
3.68 avg rating — 85 ratings
|
|
| 38 |
|
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
by
3.92 avg rating — 248 ratings
|
|
| 39 |
|
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
by
4.14 avg rating — 21 ratings
|
|
| 40 |
|
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
by
4.03 avg rating — 549 ratings
|
|
| 41 |
|
The Linux Command Line: A Complete Introduction
by
4.38 avg rating — 1,695 ratings
|
|
| 42 |
|
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
by
3.77 avg rating — 86 ratings
|
|
| 43 |
|
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
by
3.84 avg rating — 451 ratings
|
|
| 43 |
|
Social Engineering
by
3.83 avg rating — 3,856 ratings
|
|
| 43 |
|
Blackhatonomics: An Inside Look at the Economics of Cybercrime
by
3.17 avg rating — 24 ratings
|
|
| 43 |
|
Stealing the Network: How to Own a Continent
by
4.03 avg rating — 269 ratings
|
|
| 43 |
|
Red Team Field Manual
by
4.23 avg rating — 994 ratings
|
|
| 48 |
|
Learning Android
by
3.68 avg rating — 213 ratings
|
|
| 49 |
|
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
by
4.27 avg rating — 11 ratings
|
|
| 50 |
|
Virtualization Security: Protecting Virtualized Environments
by
3.80 avg rating — 5 ratings
|
|
| 51 |
|
Engineering Security
by
4.33 avg rating — 3 ratings
|
|
| 52 |
|
The SAS+ Security Handbook: The Ultimate Guide to Keeping Yourself Safe at Home & Abroad
by
3.68 avg rating — 25 ratings
|
|
| 52 |
|
Cybersecurity Leadership: Powering the Modern Organization
by
3.64 avg rating — 61 ratings
|
|
| 52 |
|
Hacking Etico 101: Como Hackear Profesionalmente En 21 Dias O Menos!
by
4.32 avg rating — 25 ratings
|
|
| 52 |
|
Future Crimes
by
3.93 avg rating — 4,382 ratings
|
|
| 52 |
|
The Florentine Deception
by
3.78 avg rating — 355 ratings
|
|
| 52 |
|
Rethinking IT Security: What needs to be said. How can we solve the IT security problem long term?
by
4.67 avg rating — 3 ratings
|
|
| 52 |
|
Moral Panic
by
4.12 avg rating — 52 ratings
|
|
| 52 |
|
Kali Linux 2: Windows Penetration Testing
by
3.31 avg rating — 13 ratings
|
|
| 52 |
|
DNA Nation: How the Internet of Genes is Changing Your Life
by
4.06 avg rating — 47 ratings
|
|
| 52 |
|
Best Practices for Protecting Your Small or Medium Size Business from Phishing
by
it was amazing 5.00 avg rating — 1 rating
|
|
| 52 |
|
Digital Downfall: Technology, Cyberattacks and the End of the American Republic
by
3.85 avg rating — 13 ratings
|
|
| 52 |
|
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
by
3.89 avg rating — 215 ratings
|
|
| 64 |
|
Impact of Security Culture on Security Compliance in Healthcare in the United States of America: Strategic Solutions for Security Breaches
by
it was amazing 5.00 avg rating — 3 ratings
|
|
| 64 |
|
The Florentine Deception
by
3.78 avg rating — 355 ratings
|
|
| 64 |
|
SAS SECURITY HANDBOOK
by
3.92 avg rating — 12 ratings
|
|
| 64 |
|
Kali Linux 2018: Windows Penetration Testing: Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018, 2nd Edition
by
3.50 avg rating — 2 ratings
|
|
| 68 |
|
One Up: A Woman in Action with the SAS
by
4.21 avg rating — 52 ratings
|
|
| 69 |
|
Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development
by
3.75 avg rating — 16 ratings
|
|
| 70 |
|
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
by
4.05 avg rating — 56 ratings
|
|
| 71 |
|
Tubes: A Journey to the Center of the Internet
by
3.51 avg rating — 3,877 ratings
|
|
| 72 |
|
The Quick Python Book
by
3.87 avg rating — 275 ratings
|
|
| 73 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by
3.91 avg rating — 3,586 ratings
|
|
| 74 |
|
Hacking Exposed: Network Security Secrets & Solutions
by
3.80 avg rating — 1,164 ratings
|
|
| 75 |
|
Schneier on Security
by
3.88 avg rating — 425 ratings
|
|
| 76 |
|
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
by
4.11 avg rating — 164 ratings
|
|
| 77 |
|
Exploiting Software: How to Break Code
by
3.44 avg rating — 81 ratings
|
|
| 78 |
|
Building Secure Software: How to Avoid Security Problems the Right Way
by
3.63 avg rating — 35 ratings
|
|
| 79 |
|
Threat Modeling: Designing for Security
by
4.07 avg rating — 283 ratings
|
|
| 80 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 155 ratings
|
|