| 1 |
|
The Pentester BluePrint: Starting a Career as an Ethical Hacker
by
4.16 avg rating — 225 ratings
|
|
| 2 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
4.20 avg rating — 56 ratings
|
|
| 3 |
|
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by
3.90 avg rating — 263 ratings
|
|
| 4 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.77 avg rating — 7,247 ratings
|
|
| 5 |
|
Social Engineering: The Science of Human Hacking
by
3.83 avg rating — 3,902 ratings
|
|
| 6 |
|
The Art of Attack: Attacker Mindset for Security Professionals
by
3.80 avg rating — 70 ratings
|
|
| 7 |
|
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
by
3.93 avg rating — 1,796 ratings
|
|
| 8 |
|
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
by
3.78 avg rating — 1,469 ratings
|
|
| 9 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by
3.91 avg rating — 3,600 ratings
|
|
| 10 |
|
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
by
4.12 avg rating — 43 ratings
|
|
| 11 |
|
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
by
3.79 avg rating — 28 ratings
|
|
| 12 |
|
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
by
4.26 avg rating — 31 ratings
|
|
| 13 |
|
Unauthorised Access: Physical Penetration Testing for IT Security Teams
by
3.85 avg rating — 136 ratings
|
|
| 14 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
|
|
| 15 |
|
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
4.20 avg rating — 183 ratings
|
|
| 16 |
|
Cryptography Engineering: Design Principles and Practical Applications
by
4.22 avg rating — 407 ratings
|
|
| 17 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.06 avg rating — 157 ratings
|
|
| 18 |
|
Hacking Multifactor Authentication
by
4.30 avg rating — 20 ratings
|
|
| 19 |
|
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
by
3.46 avg rating — 13 ratings
|
|
| 20 |
|
Kali Linux Penetration Testing Bible
by
4.20 avg rating — 25 ratings
|
|
| 21 |
|
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
by
3.94 avg rating — 47 ratings
|
|
| 22 |
|
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
by
3.88 avg rating — 67 ratings
|
|
| 23 |
|
Cybersecurity Blue Team Toolkit
by
3.67 avg rating — 42 ratings
|
|
| 24 |
|
Threat Modeling: Designing for Security
by
4.07 avg rating — 288 ratings
|
|
| 25 |
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
by
4.21 avg rating — 2,137 ratings
|
|
| 26 |
|
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by
4.23 avg rating — 1,229 ratings
|
|
| 27 |
|
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
by
4.02 avg rating — 46 ratings
|
|