| 1 |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
by
3.94 avg rating — 323 ratings
Jack
added it to to-read
See Review
|
|
| 2 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.06 avg rating — 157 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 3 |
|
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.11 avg rating — 618 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 4 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 870 ratings
Jack
added it to to-read
See Review
|
|
| 5 |
|
Penetration Testing: A Hands-On Introduction to Hacking
by
4.18 avg rating — 398 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 6 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.23 avg rating — 1,228 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 7 |
|
Writing Secure Code
by
4.01 avg rating — 373 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 8 |
|
Hackers: Heroes of the Computer Revolution
by
4.16 avg rating — 8,585 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 9 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,365 ratings
Jack
rated it 5 stars
See Review
|
|
| 10 |
|
Hacking: The Art of Exploitation w/CD
by
4.17 avg rating — 2,516 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 11 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 16,109 ratings
Jack
added it to to-read
See Review
|
|
| 12 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 266 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 13 |
|
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
by
4.20 avg rating — 1,788 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 14 |
|
Future Crimes
by
3.92 avg rating — 4,402 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 15 |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by
3.97 avg rating — 8,085 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 16 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.47 avg rating — 609 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 17 |
|
Chasing Vapor: Exploring the Murky Malice of Cybercrime
by
3.67 avg rating — 3 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 18 |
|
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
by
4.21 avg rating — 224 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 19 |
|
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by
4.34 avg rating — 10,187 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 20 |
|
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
by
3.81 avg rating — 688 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 21 |
|
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
by
4.02 avg rating — 820 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 22 |
|
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by
3.75 avg rating — 2,427 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 23 |
|
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Security, Audit and Leadership Series)
by
4.29 avg rating — 14 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 24 |
|
Thinking in Bets: Making Smarter Decisions When You Don't Have All the Facts
by
3.82 avg rating — 23,658 ratings
Jack
added it to personal-development-to-read
See Review
|
|
| 25 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
4.20 avg rating — 56 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 26 |
|
Curmudgeon: How to Succeed as an Industry Analyst
by
4.45 avg rating — 11 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 27 |
|
CISO Desk Reference Guide: A Practical Guide for CISOs
by
4.29 avg rating — 28 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 28 |
|
CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs
by
4.53 avg rating — 17 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 29 |
|
Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity
by
3.52 avg rating — 29 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 30 |
|
Understanding Cybersecurity: Emerging Governance and Strategy
by
4.25 avg rating — 4 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 31 |
|
The Internet of Risky Things: Trusting the Devices That Surround Us
by
really liked it 4.00 avg rating — 20 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 32 |
|
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
by
3.92 avg rating — 12 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 33 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure
by
3.90 avg rating — 141 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 34 |
|
Cybersecurity: A Business Solution: An executive perspective on managing cyber risk
by
really liked it 4.00 avg rating — 11 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 35 |
|
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
by
3.83 avg rating — 1,109 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 36 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 16,109 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 37 |
|
Cybersecurity Dilemma
by
4.18 avg rating — 57 ratings
Jack
added it to infosec-to-read
See Review
|
|
| 38 |
|
Cybersecurity For Dummies
by
3.72 avg rating — 140 ratings
Jack
added it to infosec-to-read
See Review
|
|