Computer Security Books

Showing 1-50 of 620
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 14 times as computer-security)
avg rating 3.76 — 7,268 ratings — published 2001
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 13 times as computer-security)
avg rating 3.97 — 27,524 ratings — published 2011
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 12 times as computer-security)
avg rating 4.17 — 8,349 ratings — published 2014
Rate this book
Clear rating
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 12 times as computer-security)
avg rating 4.28 — 16,082 ratings — published 1989
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 11 times as computer-security)
avg rating 4.23 — 1,228 ratings — published 2007
Rate this book
Clear rating
Secrets and Lies: Digital Security in a Networked World Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 10 times as computer-security)
avg rating 3.93 — 1,795 ratings — published 2000
Rate this book
Clear rating
Digital Fortress Digital Fortress (Paperback)
by (shelved 9 times as computer-security)
avg rating 3.71 — 666,875 ratings — published 1998
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 9 times as computer-security)
avg rating 4.17 — 2,517 ratings — published 2003
Rate this book
Clear rating
Applied Cryptography: Protocols, Algorithms, and Source Code in C Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 9 times as computer-security)
avg rating 4.21 — 2,136 ratings — published 1993
Rate this book
Clear rating
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 8 times as computer-security)
avg rating 3.97 — 8,085 ratings — published 2011
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 7 times as computer-security)
avg rating 4.34 — 10,156 ratings — published 2019
Rate this book
Clear rating
Hacking Exposed: Network Security Secrets & Solutions Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 7 times as computer-security)
avg rating 3.80 — 1,165 ratings — published 2000
Rate this book
Clear rating
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 7 times as computer-security)
avg rating 4.15 — 333 ratings — published 2004
Rate this book
Clear rating
Gray Hat Hacking : The Ethical Hacker's Handbook Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.09 — 540 ratings — published 2004
Rate this book
Clear rating
Cyberwar: The Next Threat to National Security & What to Do About It Cyberwar: The Next Threat to National Security & What to Do About It (Hardcover)
by (shelved 6 times as computer-security)
avg rating 3.73 — 2,463 ratings — published 2010
Rate this book
Clear rating
Metasploit: The Penetration Tester's Guide Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.07 — 870 ratings — published 2011
Rate this book
Clear rating
Reversing: Secrets of Reverse Engineering Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.09 — 545 ratings — published 2005
Rate this book
Clear rating
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.00 — 3,880 ratings — published 2015
Rate this book
Clear rating
Future Crimes Future Crimes (Hardcover)
by (shelved 5 times as computer-security)
avg rating 3.92 — 4,398 ratings — published 2015
Rate this book
Clear rating
The Tangled Web: A Guide to Securing Modern Web Applications The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.04 — 554 ratings — published 2011
Rate this book
Clear rating
Hacker's Delight Hacker's Delight (Hardcover)
by (shelved 5 times as computer-security)
avg rating 4.20 — 1,138 ratings — published 2002
Rate this book
Clear rating
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.48 — 608 ratings — published 2011
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 5 times as computer-security)
avg rating 3.91 — 3,602 ratings — published 2005
Rate this book
Clear rating
Hacking APIs: Breaking Web Application Programming Interfaces Hacking APIs: Breaking Web Application Programming Interfaces (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.21 — 100 ratings — published
Rate this book
Clear rating
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.51 — 74 ratings — published
Rate this book
Clear rating
Security in Computing Security in Computing (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.71 — 196 ratings — published 1988
Rate this book
Clear rating
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.04 — 1,610 ratings — published 2001
Rate this book
Clear rating
Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.18 — 398 ratings — published 2014
Rate this book
Clear rating
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.74 — 2,748 ratings — published 2014
Rate this book
Clear rating
Black Hat Python: Python Programming for Hackers and Pentesters Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.12 — 617 ratings — published 2014
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.04 — 551 ratings — published 2012
Rate this book
Clear rating
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Paperback)
by (shelved 4 times as computer-security)
avg rating 3.92 — 724 ratings — published 2011
Rate this book
Clear rating
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.36 — 428 ratings — published 2009
Rate this book
Clear rating
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.97 — 3,382 ratings — published 2012
Rate this book
Clear rating
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.30 — 29,088 ratings — published 1999
Rate this book
Clear rating
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.12 — 591 ratings — published 2018
Rate this book
Clear rating
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.93 — 128 ratings — published 2017
Rate this book
Clear rating
Permanent Record Permanent Record (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.30 — 58,263 ratings — published 2019
Rate this book
Clear rating
The Perfect Weapon: How the Cyber Arms Race Set the World Afire The Perfect Weapon: How the Cyber Arms Race Set the World Afire (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.25 — 3,471 ratings — published 2018
Rate this book
Clear rating
The Hacker Playbook 3: Practical Guide To Penetration Testing The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.39 — 261 ratings — published
Rate this book
Clear rating
Hacking For Dummies Hacking For Dummies (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.64 — 398 ratings — published 2004
Rate this book
Clear rating
The Dark Net: Inside the Digital Underworld The Dark Net: Inside the Digital Underworld (Hardcover)
by (shelved 3 times as computer-security)
avg rating 3.64 — 5,014 ratings — published 2014
Rate this book
Clear rating
Gray Hat Python: Python Programming for Hackers and Reverse Engineers Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.94 — 323 ratings — published 2008
Rate this book
Clear rating
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.12 — 288 ratings — published 2014
Rate this book
Clear rating
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.18 — 1,522 ratings — published 1967
Rate this book
Clear rating
Black Code: Inside the Battle for Cyberspace Black Code: Inside the Battle for Cyberspace (Hardcover)
by (shelved 3 times as computer-security)
avg rating 3.94 — 277 ratings — published 2011
Rate this book
Clear rating
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.07 — 15,127 ratings — published 2014
Rate this book
Clear rating
The Browser Hacker's Handbook The Browser Hacker's Handbook (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.14 — 76 ratings — published 2014
Rate this book
Clear rating
Cryptography Engineering: Design Principles and Practical Applications Cryptography Engineering: Design Principles and Practical Applications (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.22 — 407 ratings — published 2010
Rate this book
Clear rating
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.34 — 125 ratings — published 2014
Rate this book
Clear rating


David Chiles
“Use Secure Sites: It is proper netiquette to use secure websites whenever possible. NetworkEtiquette.net”
David Chiles, The Principles Of Netiquette

Ian Lamont
“Dropbox users themselves may be the source of security problems. If you are sharing a folder with 100 users, a couple of them are bound to be using easily guessed passwords to guard their accounts (the names of pets or first-born children, 'password', etc.). Sharing links can also lead to problems, if the wrong link is shared or someone posts the link online or in some other public forum.”
Ian Lamont, Dropbox In 30 Minutes

More quotes...